Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
Cyber dating abuse among teens using school-based health centersDick, Rebecca N ; McCauley, Heather L ; Jones, Kelley A ; Tancredi, Daniel J ; Goldstein, Sandi ; Blackburn, Samantha ; Monasterio, Erica ; James, Lisa ; Silverman, Jay G ; Miller, ElizabethPediatrics (Evanston), 2014-12, Vol.134 (6), p.e1560-e1567 [Periódico revisado por pares]United States: American Academy of PediatricsTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
Financial Cybercrime: A Comprehensive Survey of Deep Learning Approaches to Tackle the Evolving Financial Crime LandscapeNicholls, Jack ; Kuppa, Aditya ; Le-Khac, Nhien-AnIEEE access, 2021, Vol.9, p.163965-163986 [Periódico revisado por pares]Piscataway: IEEETexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Evolution of Dark Web Threat Analysis and Detection: A Systematic ApproachNazah, Saiba ; Huda, Shamsul ; Abawajy, Jemal ; Hassan, Mohammad MehediIEEE access, 2020, Vol.8, p.171796-171819 [Periódico revisado por pares]Piscataway: IEEETexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
Hacking Power Grids: A Current ProblemKshetri, Nir ; Voas, JeffreyComputer (Long Beach, Calif.), 2017-12, Vol.50 (12), p.91-95 [Periódico revisado por pares]New York: IEEETexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering AttacksHeartfield, Ryan ; Loukas, GeorgeACM computing surveys, 2016-02, Vol.48 (3), p.1-39 [Periódico revisado por pares]Baltimore: Association for Computing MachineryTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
The Art of Cybercrime Community ResearchHughes, Jack ; Pastrana, Sergio ; Hutchings, Alice ; Afroz, Sadia ; Samtani, Sagar ; Li, Weifeng ; Santana Marin, EricssonACM computing surveys, 2024-06, Vol.56 (6), p.1-26, Article 155 [Periódico revisado por pares]New York, NY: ACMTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Wordnet-Based Criminal Networks Mining for Cybercrime InvestigationIqbal, Farkhund ; Fung, Benjamin C. M. ; Debbabi, Mourad ; Batool, Rabia ; Marrington, AndrewIEEE access, 2019, Vol.7, p.22740-22755 [Periódico revisado por pares]Piscataway: IEEETexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Antecedents of Cybersecurity Implementation: A Study of the Cyber-Preparedness of U.K. Social EnterprisesWhite, Gareth R. T. ; Allen, Robert A. ; Samuel, Anthony ; Abdullah, Ahmed ; Thomas, Robert J.IEEE transactions on engineering management, 2022-12, Vol.69 (6), p.3826-3837 [Periódico revisado por pares]IEEETexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
The Spatiotemporal Pattern and Driving Factors of Cyber Fraud Crime in ChinaChen, Shuai ; Gao, Chundong ; Jiang, Dong ; Hao, Mengmeng ; Ding, Fangyu ; Ma, Tian ; Zhang, Shize ; Li, ShundeISPRS international journal of geo-information, 2021-12, Vol.10 (12), p.802 [Periódico revisado por pares]Basel: MDPI AGTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping NetworksQin, Jiahu ; Li, Menglin ; Shi, Ling ; Yu, XinghuoIEEE transactions on automatic control, 2018-06, Vol.63 (6), p.1648-1663 [Periódico revisado por pares]IEEETexto completo disponível |