Mapping the geography of cybercrime: A review of indices of digital offending by country

J Lusthaus, M Bruce, N Phair - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
The acknowledgement that cybercrime offenders are embedded within local contexts
presents a broad vector for further study. But research in this area is still in its early days and …

Towards attribution in mobile markets: Identifying developer account polymorphism

S Sebastian, J Caballero - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
Malicious developers may succeed at publishing their apps in mobile markets, including the
official ones. If reported, the apps will be taken down and the developer accounts possibly …

NoSQL databases: forensic attribution implications

WK Hauger, MS Olivier - SAIEE Africa Research Journal, 2018 - ieeexplore.ieee.org
NoSQL databases have gained a lot of popularity over the last few years. They are now
used in many new system implementations that work with vast amounts of data. Such data …

[PDF][PDF] Applying supervised learning on malware authorship attribution

C Boot - 2019 - cs.ru.nl
Malware is a problem in current digital society, since it can cause economic or physical
damage and in the end disrupt society as a whole. Although anti-virus solutions attempt to …

Who are you? OSINT-based profiling of infrastructure honeypot visitors

T Sasaki, K Yoshioka… - 2023 11th International …, 2023 - ieeexplore.ieee.org
Cyber attacks are reported daily and have become a major social issue. However, it is still
unclear who the attackers are and their background. In this paper, using OSINT-based …

[PDF][PDF] Formulation of Association Rule Mining (ARM) for an Effective Cyber Attack Attribution in Cyber Threat Intelligence (CTI)

MS Abu, SR Selamat, R Yusof… - International Journal of …, 2021 - pdfs.semanticscholar.org
Tactic, Technique and Procedure (TTPs) in launching cyberattack that make it less
predictable, more persistent, resourceful and better funded. So many organisation has opted …

Modeling Cyber-Attribution Using Machine Learning Techniques

M Alkaabi, SO Olatunji - 2020 30th International Conference on …, 2020 - ieeexplore.ieee.org
Cyberspace is a virtual environment where communication over computer networks happen.
This space is vulnerable to cyber-attacks. After the attack happened, it has left many …

Attribution, state responsibility, and the duty to prevent malicious cyber-attacks in international law

JD Jolley - State Responsibility, and the Duty to Prevent Malicious …, 2017 - papers.ssrn.com
Malicious cyber-attacks, those cyber-attacks which do not rise to the level of force in
international law, pose a significant problem to the international community. Attributing …

[PDF][PDF] Computer criminal profiling applied to digital investigations

LM Donato - 2021 - dora.dmu.ac.uk
This PhD thesis aims to contribute to the Cyber Security body of knowledge and its
Computer Forensic field, still in its infancy when comparing with other forensic sciences …

[图书][B] Big data systems: a 360-degree approach

JA Shamsi, MA Khojaye - 2021 - taylorfrancis.com
Big Data Systems encompass massive challenges related to data diversity, storage
mechanisms, and requirements of massive computational power. Further, capabilities of big …