Detecting plagiarism in student Pascal programs
The Computer Journal
The internet worm program: an analysis
ACM SIGCOMM Computer Communication Review
Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code
Computers and Security
Fighting computer crime: a new framework for protecting information
Fighting computer crime: a new framework for protecting information
Transnational Criminal Organizations, Cybercrime and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace
COPLINK: managing law enforcement data and knowledge
Communications of the ACM
Mining e-mail content for author identification forensics
ACM SIGMOD Record
Distributed Data Mining in Credit Card Fraud Detection
IEEE Intelligent Systems
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Data Mining Methods for Detection of New Malicious Executables
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Smokey: automatic recognition of hostile messages
AAAI'97/IAAI'97 Proceedings of the fourteenth national conference on artificial intelligence and ninth conference on Innovative applications of artificial intelligence
CyberIR --- A Technological Approach to Fight Cybercrime
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Detecting complex account fraud in the enterprise: The role of technical and non-technical controls
Decision Support Systems
A hierarchical Naïve Bayes model for approximate identity matching
Decision Support Systems
An investigation of email processing from a risky decision making perspective
Decision Support Systems
CybercrimeIR --- a technological perspective to fight cybercrime
PAISI'12 Proceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics
Getting Real About Virtual Worlds: A Review
International Journal of Virtual Communities and Social Networking
Hi-index | 0.00 |
Cybercrime is becoming ever more serious. Findings from the 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we define different types of cybercrime and review previous research and current status of fighting cybercrime in different countries that rely on legal, organizational, and technological approaches. We focus on a case study of fighting cybercrime in Taiwan and discuss problems faced. Finally, we propose several recommendations to advance the work of fighting cybercrime.