Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Nowadays, the darknet or dark web has become one of the most booming topics in context with cyber security. [6]Several research studies and current reports conclude that how the anonymous nature of the darknet provides a platform for... more
    • by  and +2
    •   8  
      Operating SystemsComputer NetworksCloud ComputingData Security
Η ραγδαία εξέλιξη των τεχνολογικών μέσων και η καθιέρωση του διαδικτύου ως απαραίτητο και χρήσιμο εργαλείο, κυρίως στις Δυτικές κοινωνίες, προκάλεσε αδιαμφισβήτητα μια μετατόπιση του εγκλήματος, από τον φυσικό «υπαρκτό» κόσμο, στον... more
    • by 
    •   8  
      CriminologyCriminal LawCybercrimesChild Sexual Abuse
Within the last decade, there have been a proliferation of crypto (virtual)currencies and increasing consumer confidence accompanied by more acceptability by a growing number of merchants. This means cryptocurrencies are shifting from... more
    • by 
    •   9  
      Cyber TerrorismNational SecurityCybercrimeVirtual Currencies
The dark web and the proliferation of criminals who have exploited its cryptographic protocols to commit crimes anonymously has created major challenges for law enforcement around the world. Traditional policing techniques have required... more
    • by 
    •   7  
      Criminal LawCybercrimesPolitical ScienceTransnational Crime
    • by 
    •   7  
      Internet StudiesInternet & SocietyThe InternetDrug Trade
Il saggio affronta il tema della responsabilità penale dell’Internet Service Provider, approfondendo il ruolo dei social media nel contrasto ai reati commessi nella rete. Dopo avere dato conto delle caratteristiche essenziali del Web 2.0,... more
    • by 
    •   6  
      Criminal LawInternet Service ProviderDiritto PenaleDiffamazione on Line
Recently, there is an interest in studying cyber crime from a hacker-centric perspective, whose insight is to locate key-hackers and use them to find credible threat intelligence. However, the great majority of users present in hacking... more
    • by 
    •   5  
      Machine LearningGenetic AlgorithmsReputationHacking
Referensi dari Buku Keamanan Digital
    • by 
    •   4  
      Digital securityFirewallSecurity Awarenessdarkweb
In recent years, there is a notable rise for proactive, intelligence-driven cyber defense mechanisms. Following this demand, we study here how to leverage the spread of adoption behavior among individuals to predict their posts on hacking... more
    • by 
    •   4  
      AdoptionSocial InfluenceHackingdarkweb
The paper dwells on China's online underground economy using a three-dimensional approach: examining the value chains, empirical and statistical analyses. These present a vivid picture of shadow players, their actions, recruitment... more
    • by 
    •   8  
      CybercrimesCyberspaceUnderground economyCybersecurity
Many people involved in malicious cyber activity rely on online environments to improve their hacking skills and capabilities, among which, darkweb marketplaces are one of the most prevalent. Vendors advertise and sell their wares... more
    • by 
    •   4  
      HackingMarketplaceKnowledge Communitiesdarkweb