Al-Khater et al., 2020 - Google Patents
Comprehensive review of cybercrime detection techniquesAl-Khater et al., 2020
View PDF- Document ID
- 3652671952048262712
- Author
- Al-Khater W
- Al-Maadeed S
- Ahmed A
- Sadiq A
- Khan M
- Publication year
- Publication venue
- IEEE access
External Links
Snippet
Cybercrimes are cases of indictable offences and misdemeanors that involve computers or communication tools as targets and commission instruments or are associated with the prevalence of computer technology. Common forms of cybercrimes are child pornography …
- 238000000034 method 0 title abstract description 100
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Al-Khater et al. | Comprehensive review of cybercrime detection techniques | |
Mijwil et al. | The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review | |
Khraisat et al. | A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges | |
Soomro et al. | Social Media-Related Cybercrimes and Techniques for Their Prevention. | |
Sun et al. | Data-driven cybersecurity incident prediction: A survey | |
Hindy et al. | A taxonomy of network threats and the effect of current datasets on intrusion detection systems | |
Alani | Big data in cybersecurity: a survey of applications and future trends | |
Moustafa | Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic | |
US10165005B2 (en) | System and method providing data-driven user authentication misuse detection | |
Bhavsar et al. | Intrusion detection system using data mining technique: Support vector machine | |
Chinedu et al. | Cybercrime detection and prevention efforts in the last decade: an overview of the possibilities of machine learning models | |
Veena et al. | C SVM classification and KNN techniques for cyber crime detection | |
Boshmaf et al. | Thwarting fake OSN accounts by predicting their victims | |
Albayati et al. | Analysis of intelligent classifiers and enhancing the detection accuracy for intrusion detection system | |
Quezada et al. | Real-time bot infection detection system using DNS fingerprinting and machine-learning | |
Krishnapriya et al. | A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques. | |
Ispahany et al. | Detecting malicious COVID-19 URLs using machine learning techniques | |
Churcher et al. | ur Rehman | |
Naz et al. | A comprehensive survey on social engineering-based attacks on social networks | |
Alavizadeh et al. | A survey on threat situation awareness systems: framework, techniques, and insights | |
Imtiaz et al. | Analysis of cybersecurity measures for detection, prevention, and misbehaviour of social systems | |
Kaushik et al. | Advanced Techniques and Applications of Cybersecurity and Forensics | |
Dsouza et al. | Real time network intrusion detection using machine learning technique | |
Khan et al. | AI-powered detection and mitigation of backdoor attacks on databases server | |
Bolatbek et al. | A framework for detection and mitigation of cyber criminal activities using university networks in Kazakhstan |