Cyberstalking: Harassment in the Internet Age and How to Protect Your Family
Cyberstalking: Harassment in the Internet Age and How to Protect Your Family
Communications of the ACM
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
International Journal of Security and Networks
Forensic analysis of SCADA systems and networks
International Journal of Security and Networks
On the (un)reliability of eavesdropping
International Journal of Security and Networks
Using PLSI-U to detect insider threats by datamining e-mail
International Journal of Security and Networks
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
International Journal of Security and Networks
Adaptive clustering for scalable key management in dynamic group communications
International Journal of Security and Networks
Efficient multicast stream authentication for the fully adversarial network model
International Journal of Security and Networks
Aggregate designated verifier signatures and application to secure routing
International Journal of Security and Networks
International Journal of Security and Networks
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Server side hashing core exceeding 3 Gbps of throughput
International Journal of Security and Networks
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
International Journal of Security and Networks
On security proof of McCullagh Barreto's key agreement protocol and its variants
International Journal of Security and Networks
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
International Journal of Security and Networks
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
International Journal of Security and Networks
Strong password-based authentication in TLS using the three-party group Diffie Hellman protocol
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
Multilayer key establishment for large-scale sensor networks
International Journal of Security and Networks
Visualisation of wormholes in underwater sensor networks: a distributed approach
International Journal of Security and Networks
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
International Journal of Security and Networks
Origins: an approach to trace fast spreading worms to their roots
International Journal of Security and Networks
A novel Conference Key Management solution for Secure Dynamic Conferencing
International Journal of Security and Networks
Anonymous authentication protocol for GSM networks
International Journal of Security and Networks
Towards a realistic testbed for wireless network reliability and security performance studies
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
Adaptive trust-based anonymous network
International Journal of Security and Networks
Securing Wi-Fi networks with position verification: extended version
International Journal of Security and Networks
On pairwise connectivity of wireless multihop networks
International Journal of Security and Networks
Hash-AV: fast virus signature scanning by cache-resident filters
International Journal of Security and Networks
Secure message delivery in publish/subscribe networks using overlay multicast
International Journal of Security and Networks
Optimal worm-scanning method using vulnerable-host distributions
International Journal of Security and Networks
Vulnerabilities in distance-indexed IP traceback schemes
International Journal of Security and Networks
Single packet IP traceback in AS-level partial deployment scenario
International Journal of Security and Networks
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
International Journal of Security and Networks
Design and analysis of a multipacket signature detection system
International Journal of Security and Networks
Analysis of flow-correlation attacks in anonymity network
International Journal of Security and Networks
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
Elliptic curve cryptography-based access control in sensor networks
International Journal of Security and Networks
A lightweight encryption and authentication scheme for wireless sensor networks
International Journal of Security and Networks
Analysis of routing security-energy trade-offs in wireless sensor networks
International Journal of Security and Networks
Load-balanced key establishment methodologies in wireless sensor networks
International Journal of Security and Networks
Limiting DoS attacks during multihop data delivery in wireless sensor networks
International Journal of Security and Networks
End-to-end security mechanisms for SMS
International Journal of Security and Networks
International Journal of Security and Networks
A self-encryption authentication protocol for teleconference services
International Journal of Security and Networks
An adaptive expert system approach for intrusion detection
International Journal of Security and Networks
Convertible identity-based anonymous designated ring signatures
International Journal of Security and Networks
Low-power authenticated group key agreement for heterogeneous wireless networks
International Journal of Security and Networks
A new signature scheme without random oracles
International Journal of Security and Networks
Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
International Journal of Security and Networks
International Journal of Security and Networks
Workflow authorisation in mediator-free environments
International Journal of Security and Networks
Vulnerability analysis of certificate graphs
International Journal of Security and Networks
Secure scalable group signature with dynamic joins and separable authorities
International Journal of Security and Networks
A survey of key evolving cryptosystems
International Journal of Security and Networks
A taxonomy of internet traceback
International Journal of Security and Networks
An approach to synthesise safe systems
International Journal of Security and Networks
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
International Journal of Security and Networks
Building trust in peer-to-peer systems: a review
International Journal of Security and Networks
Secure collaborations over message boards
International Journal of Security and Networks
Formal modelling and analysis of XML firewall for service-oriented systems
International Journal of Security and Networks
Firewall filtering rules analysis for anomalies detection
International Journal of Security and Networks
PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks
International Journal of Security and Networks
Verifying security protocols by knowledge analysis
International Journal of Security and Networks
An agent-based framework for intrusion detection alert verification and event correlation
International Journal of Security and Networks
Secure user-identification and key distribution scheme preserving anonymity
International Journal of Security and Networks
ID-based threshold proxy signcryption scheme from bilinear pairings
International Journal of Security and Networks
An one-way function based framework for pairwise key establishment in sensor networks
International Journal of Security and Networks
Clique-based group key assignment in Wireless Sensor Networks
International Journal of Security and Networks
NTP-DownloadT: a conformance test tool for secured mobile download services
International Journal of Security and Networks
An iris and retina multimodal biometric system
International Journal of Security and Networks
Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks
International Journal of Security and Networks
Proximity-based authentication of mobile devices
International Journal of Security and Networks
Secure pairing of interface constrained devices
International Journal of Security and Networks
Secure pairing with biometrics
International Journal of Security and Networks
Seeing-Is-Believing: using camera phones for human-verifiable authentication
International Journal of Security and Networks
Using audio in secure device pairing
International Journal of Security and Networks
User-aided data authentication
International Journal of Security and Networks
Standards for security associations in personal networks: a comparative analysis
International Journal of Security and Networks
Designing user studies for security applications: a case study with wireless network configuration
International Journal of Security and Networks
An evaluation of connection characteristics for separating network attacks
International Journal of Security and Networks
Deriving a closed-form expression for worm-scanning strategies
International Journal of Security and Networks
An efficient One-Time Password authentication scheme using a smart card
International Journal of Security and Networks
Using link RTT to passively detect unapproved wireless nodes
International Journal of Security and Networks
Overview of satellite communication networks security: introduction of EAP
International Journal of Security and Networks
An escrow-less identity-based group-key agreement protocol for dynamic peer groups
International Journal of Security and Networks
Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks
International Journal of Security and Networks
A Proactive Secret Sharing Scheme in matrix projection method
International Journal of Security and Networks
TKS: a transition key management scheme for secure application level multicast
International Journal of Security and Networks
Handling inheritance violation for secure interoperation of heterogeneous systems
International Journal of Security and Networks
Visibility: a novel concept for characterising provable network digital evidences
International Journal of Security and Networks
Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks
International Journal of Security and Networks
Attacks and countermeasures in multi-hop Cognitive Radio Networks
International Journal of Security and Networks
A backpressure technique for filtering spoofed traffic at upstream routers
International Journal of Security and Networks
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
International Journal of Security and Networks
An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
International Journal of Security and Networks
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
International Journal of Security and Networks
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
International Journal of Security and Networks
Lightweight authentication protocol for mobile RFID networks
International Journal of Security and Networks
A cross-layer authentication design for secure video transportation in wireless sensor network
International Journal of Security and Networks
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
International Journal of Security and Networks
International Journal of Security and Networks
Trust in RFID-enabled Supply-Chain Management
International Journal of Security and Networks
On the security of RFID devices against implementation attacks
International Journal of Security and Networks
Secure and efficient data transmission in RFID sensor networks
International Journal of Security and Networks
Security and privacy on low-cost Radio Frequency Identification systems
International Journal of Security and Networks
Looking at a class of RFID APs through GNY logic
International Journal of Security and Networks
Radio frequency identification: a case study of healthcare organisations
International Journal of Security and Networks
A ubiquitous mobile telemedicine system for the elderly using RFID
International Journal of Security and Networks
Perceived barriers to the widespread commercial use of Radio Frequency Identification technology
International Journal of Security and Networks
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
International Journal of Security and Networks
Security assessments of IEEE 802.15.4 standard based on X.805 framework
International Journal of Security and Networks
Experimental analysis of application-level intrusion detection algorithms
International Journal of Security and Networks
Google Android: A Comprehensive Security Assessment
IEEE Security and Privacy
Enhancing Intrusion Detection System with proximity information
International Journal of Security and Networks
Efficient decision tree for protocol analysis in intrusion detection
International Journal of Security and Networks
An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols
International Journal of Security and Networks
On the scalability of Delay-Tolerant Botnets
International Journal of Security and Networks
Detect DDoS flooding attacks in mobile ad hoc networks
International Journal of Security and Networks
Scene of the Cybercrime
Hi-index | 0.00 |
With the advancement of computer and information technology, cyber crime is now becoming one of the most significant challenges facing law enforcement organizations. Cyber crimes are generally referred as criminal activities that use computers or networks. An understanding of the characteristics and nature of cyber crimes is important in helping research communities find ways to effectively prevent them. Most existing research focuses more on attacks and attack models, including either actual attacks or imaginary/possible attacks over all layers of networks or computers, but there has been less work carried out on a comprehensive survey of cyber crimes. This paper provides a survey of cyber crimes that have actually occurred. First, cyber crimes in the digital world are compared with crimes in the physical world. Then, cyber crimes are categorized according to the roles of computers or networks. Furthermore, we also notice that some cyber crimes are actually traditionally non-cyber crimes that are facilitated by computers or networks. It is surprising that there are so many recurrent cyber crimes. More efforts are needed to protect people from cyber crimes. Copyright © 2011 John Wiley & Sons, Ltd. (This paper provides a survey of cyber crimes that have actually occurred. First, cyber crimes in the digital world are compared with crimes in the physical world. Then, cyber crimes are categorized according to the roles of computers or networks.)