405 results on '"Computer crimes -- Analysis"'
Search Results
2. Ticketmaster breach highlights consequences of cybercrime-as-a-service marketplaces and shared responsibility model
3. Online fraud, hacks, and scams, oh my
4. The personal data incident in Kumla also affects Askersund municipality
5. The personal data incident in Kumla also affects Hallsberg municipality
6. The personal data incident in Kumla also affects Laxa municipality
7. The personal data incident in Kumla also affects Lekeberg municipality
8. PF analyzes servers that host government data to discover origin of alleged hacker attack
9. The Effect of Malicious Cyber Activity on the U.S. Corporate Sector
10. Advisory for Enhancement of API Authentication & Security for Trading Members
11. USE OF TECHNOLOGY FOR ILLEGAL PURPOSES: Violation of intimacy by means of cyber crimes: USO DA TECNOLOGIA PARA FINS ILICITOS/A violacao da intimidade por meio de crimes informaticos
12. Future Cybercrime (zck) (research Into Future Cybercrime (zck) / Future Cybercrime (zck) (research Into Future Cybercrime (zck))
13. Cyber Ad-versaries Using Analytics to Measure 'Victims per Click' HP warns of rise in malicious PDF campaigns and Office exploits, while noting Office macros persist
14. These are the most used passwords in Spain: admin and 123456 are two of them
15. Love is expensive: SSC- CDMX warns about 'crypto-romance' scam
16. Proposal of a simple open-source quantitative tribometric assay and its implementation for the assessment of the effects of redox-related alterations on the lubrication capacity of a commercial water-based lubricant gel (Updated August 1, 2022)
17. Analysis of Recent DeFi Scams and Hacks
18. Initial security analysis of ChatGPT4 finds scenarios for accelerated cybercrime
19. Anomali and ONG-ISAC Announce Joint Initiative to Combat Cybercrime in Oil & Natural Gas Sector
20. The Vatican Is Buzzing With Conspiracy Theories as Hackers Take Down the Pope's Website
21. BREVE PANORAMA SOBRE A LEGISLACAO APLICADA NOS CRIMES ELETRONICOS/BRIEF OVERVIEW OF LEGISLATION APPLIED IN ELECTRONIC CRIMES
22. Preparing for Multidomain Warfare: Lessons from Space/Cyber Operations
23. New 'Watch Center' to ring alarms on space-related cyber threats
24. Initial security analysis of ChatGPT4 finds scenarios for accelerated cybercrime
25. Sri Lanka : Sri Lanka signs the Second Additional Protocol to the Convention on Cybercrime on enhanced co-operation and disclosure of electronic evidence of the Council of Europe
26. FortiGuard Labs Predicts the Convergence of Advanced Persistent Threat Methods with Cybercrime
27. Winmill Employee Wins Veracode Video Contest
28. Threat and challenges of cyber-crime and the response
29. FICCI-EY Report Cyber Crime Management: Innovations/Models in Cybercrime Management
30. Allianz Risk Barometer 2019: Cyber Now Equally Concerning for Companies As Their Major Traditional Exposures
31. Allianz Risk Barometer 2019: Cyber Now Equally Concerning for Companies As Their Major Traditional Exposures
32. This man will save you from the evils of the internet: Part 3
33. Lahore Garrison University Researcher Publishes Findings in Global Digital and Print Media (Portrayal of Pakistan Electronic Crimes Act in Leading Liberal Dailies of Pakistan)
34. Stealing masks and amulets: what's law got to do with it?
35. United States : HP Threat Research Shows Attackers Exploiting Zero?Day Vulnerability Before Enterprises Can Patch
36. John Howell ask the Secretary of State for the Home Department, if she will make an assessment of the implications for her policies of the debate that took place at the Council of Europe on 30 September 2021 on the Convention on Cybercrime
37. Hacker nation: China's cyber assault
38. Artificial Intelligence and advanced Data Analytics for Law Enforcement Agencies
39. Sarah Olney ask the Secretary of State for the Home Department, if she will make an assessment of the potential merits of establishing a centralised reporting function for enhanced data sharing to help prevent scams relating to financial services
40. Bobby Brazier blasts 'c***' who hacked his Instagram to scam money from his fans; The 16-year-old model son of Jade Goody and Jeff Brazier lashed out at the person who used his account to scam money out of his kind and unsuspecting fans
41. Intimate partner violence, technology and stalking
42. An empirical study of attitudes and opinions of computer crimes: a comparative study between U.K. and the Kingdom of Bahrain
43. An analysis of the top 10 most cybercrime-ridden states
44. IMPROVING GRID RELIABILITY IN THE FACE OF EXTREME EVENTS
45. Robustness of the Markov-Chain model for cyber-attack detection
46. Industrial espionage: the dark side of the 'digital age'
47. Cyberstalking, personal privacy, and moral responsibility
48. Driving towards success in the Air Force cyber mission: leveraging our heritage to shape our future
49. Bad guys and good stuff: When and where will the cyber threats converge?
50. A general theory of crime and computer crime: An empirical test
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.