Comprehensive review of cybercrime detection techniques
المؤلف | Al-Khater W.A. |
المؤلف | Al-Maadeed, Somaya |
المؤلف | Ahmed A.A. |
المؤلف | Sadiq A.S. |
المؤلف | Khan M.K. |
تاريخ الإتاحة | 2022-05-19T10:23:11Z |
تاريخ النشر | 2020 |
اسم المنشور | IEEE Access |
المصدر | Scopus |
المعرّف | http://dx.doi.org/10.1109/ACCESS.2020.3011259 |
الملخص | Cybercrimes are cases of indictable offences and misdemeanors that involve computers or communication tools as targets and commission instruments or are associated with the prevalence of computer technology. Common forms of cybercrimes are child pornography, cyberstalking, identity theft, cyber laundering, credit card theft, cyber terrorism, drug sale, data leakage, sexually explicit content, phishing, and other forms of cyber hacking. They mostly lead to a privacy breach, security violation, business loss, financial fraud, or damage in public and government properties. Thus, this study intensively reviews cybercrime detection and prevention techniques. It first explores the different types of cybercrimes and discusses their threats against privacy and security in computer systems. Then, it describes the strategies that cybercriminals may utilize in committing these crimes against individuals, organizations, and societies. It also reviews the existing techniques of cybercrime detection and prevention. It objectively discusses the strengths and critically analyzes the vulnerabilities of each technique. Finally, it provides recommendations for the development of a cybercrime detection model that can detect cybercrimes effectively compared with the existing techniques. |
راعي المشروع | This work was supported by the NPRP from the Qatar National Research Fund (a member of the Qatar Foundation) under the National Priorities Research Program (NPRP) under Grant PRP12S-0312-190332. The statements made herein are solely the responsibility of the authors. |
اللغة | en |
الناشر | Institute of Electrical and Electronics Engineers Inc. |
الموضوع | Computer privacy Crime Network security Personal computing Child pornographies Communication tools Computer technology Detection models Prevention techniques Privacy and security Privacy breaches Security violations Computer crime |
النوع | Article |
الصفحات | 137293-137311 |
رقم المجلد | 8 |
الملفات في هذه التسجيلة
الملفات | الحجم | الصيغة | العرض |
---|---|---|---|
لا توجد ملفات لها صلة بهذه التسجيلة. |
هذه التسجيلة تظهر في المجموعات التالية
-
علوم وهندسة الحاسب [2427 items ]