Real time web analytics, Heat map tracking
Search: 
Authors: 
Title: 
Abstract: 
Journal: 
Category:
3CE: Cybercrime Repository
?
Title Author(s)
Title: Comprehensive Approach to Increase Cyber Security and Resilience - CAMINO Roadmap and Research Agenda

In this paper the initial results of the European project CAMINO in terms of the realistic roadmap to counter cyber crime and cyber terrorism are presented. The roadmap is built in accordance to so called CAMINO THOR approach, where cyber security ...
Download | View

Author(s): Micha Chora, María Pilar Torres Bruna , Andrew Churchill, Irene Eguinoa, Rafa Kozik, Artsiom Yautsiukhin, Iwona Maciejewska, Adel Jomni
Title: A Cybercrime Prevention Program based on Simulation and Quiz Game: Applying Item Response Theory for Effective Information Security Learning

Recently, as utilization rate of the Internet gets higher, cybercrime rates are growing up. In order not to be damaged from such cybercrimes, the importance of an education for protection from them is increasingly critical. However, the existing information security educations...
Download | View

Author(s): Seong Baeg Kim, Su Ryeon Kim, Ji Hyeon Yang
Title: A Dangerous Trend of Cybercrime: Ransomware Growing Challenge

Recently computers are used massively due to advent of the internet and technology, so as cybercriminals also emerged to target innocent users to make money from the victims. People across the globe are subjected to extortion on a very large scale. Ransomware is modern and tec...
Download | View

Author(s): P.B.Pathak
Title: A Review and Survey of Vehicular Network’s Cybercrime and Security Approaches

Cybercrime is a challenging task in vehicular adhoc network (VANET), for develop the tools and reliable sources to analyze the information during the emergencies or incidents. The emergency organizers and responders for prevent the criminal activities gradually depends on comp...
Download | View

Author(s): F. N. Bhatti, R. B. Ahmad, H. M. Bhatti, M. N. M. Warip, S. J. Elias
Title: Active Defense Catching the Criminal in the Act

Presentation of the HoneyCy, a comprehensive open-source system that integrates mature honeypot implementations into a single inexpensive framework with the provision for visualization and management support via a web and an Android app. 

...
Download | View
Author(s): Dr. Ioanna Dionysiou
Title: An innovative Digital Forensic Tool assisting evidence analysis in Cyprus

Digital forensic examination is proven to be a time consuming task that relies heavily on the qualities and extensive expertise of the Digital Forensic Examiner (DFE). Nowadays, due to the rapid increase on the volume of digital evidence, the skills of the DFE are not sufficie...
Download | View

Author(s): Elisavet Charalambous, Romaios Bratskas, George Karkas, Andreas Anastasiades, Nikolaos Koutras
Title: Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis

The central question of this article is whether routine activity theory (RAT) can be used as an analytical framework to study cybercrimes. Both a theoretical analysis and an analysis of empirical studies have thus far failed to provide a clear answ...
Download | View

Author(s): Eric Rutger Leukfeldt, Majid Yar
Title: Challenges and Analysis in Cyber Crime

Digital technology is about all walks of life, all over the world and has brought the real meaning of globalization. Once end cyber system provides opportunities to communicate and at the other end some individuals or community utilize its&nbs...
Download | View

Author(s): Pranav Patil
Title: Cracking Down On Cybercrime Global Response: The Cybercrime Convention

Computers and the Internet have brought innumerable benefits to society. They have revolutionized the way people work, play, and communicate. In spite of the benefits the Internet has introduced to the global community, it is also fraught with risks associated with undesirable...
Download | View

Author(s): Sylvia Mercado Kierkegaard
Title: Cyber Crime Trends in the Banking Sector

Employing and describing real cases, the presentation emphasizes on the main cyber threats targeting the banking sector across the world. 

...
Download | View
Author(s): Alexis Michael
Title: Cybercrime and Cybercriminals: A Comprehensive Study

The increasing expansion and diversification in the strategies and practices of cybercrime has become a difficult obstacle in order both to understand the extent of embedded risks and to define efficient policies of prevention for corporations, institutions and agencies. The p...
Download | View

Author(s): Regner Sabillon, Jeimy Cano, Victor Cavaller, Jordi Serra
Title: Cybercrimes, security and challenges

Cybercrime is a range of illegal digital activities to target an individual or an organization in order to cause harm. The term cybercrime applies to a wide range of attack methods. It can range from mere web site defacements to grave activities su...
Download | View

Author(s): Tahir Hussain Bhat, Afaq Alam Khan
Title: Cybersecurity Current Thread Landscape and Related Cyprus Incidents

The presentation reflects on the current facts and security threats by providing information on how these threats have evolved through the time 

...
Download | View
Author(s): Stelios Stylianou
Title: Cybersecurity Strategy of the Republic of Cyprus

A detailed overview of the Cybersecurity Strategy employed by the Republic of Cyprus 

...
Download | View
Author(s): Antonis Antoniades
Title: Cyberterrorism: A Comparative Legal Perspective

The paper focuses on cyberterrorism and a comparative legal perspective with a view to examine the cyberterrorism as a concept as well as its definition. The revolution of development of Information and Communication Technology (ICT) has changed so...
Download | View

Author(s): Mu’azu Abdullahi Saulawa, Junaidu Bello Marshal
Title: Cyprus Cybercrime Centre of Excellence – 3CE

The presentation gives an overview of the aims, deliverables and activities of the EU co-funded project 3CE – Cyprus Cybercime Centre of Excellence. 

...
Download | View
Author(s): Κωνσταντίνος Τσιούρτος
Title: Cyprus Police Office for Combating Cybercrime and Digital Forensic Lab

The presentation describes the role of the Cyprus Police Office for Combating Cybercrime while focusing on the main cyber related trends associated with the implementation of the Office.

...
Download | View
Author(s): Giorgos Karkas
Title: Digital Forensic Tools assisting evidence analysis in combating cybercime

The presentation focuses on the use of modern forensic digital systems as a mean of analyzing and identifying evidence findings in cyberspace and the extensive study of existing systems to be used by specialists in the field. 

...
Download | View
Author(s): Ελισσάβετ Χαραλάμπους
Title: Email Forensic Tools: A roadmap to email header analysis through a cybercrime use case

Email is one of the primary sources of numerous criminal activities, on the Internet, of which some threaten human lives. Email analysis is challenging due to not only various fields that can be forged by hackers or the wide range email application...
Download | View

Author(s): Elisavet Charalambous, Romaios Bratskas, George Karkas, Andreas Anastasiades, Nikolaos Koutras
Title: Emergence of Cyber Security and transformations in the World Order

Cyber security has emerged in the backdrop of information, communication and technological revolution and acts as the corner stone of a connected world. Within the purview of this revolution, the international community across the globe came in con...
Download | View

Author(s): Sushma Devi, Mohd Aarif Rather
Title: Empowering end-users to combat cybercrime: An Open-Source Toolkit

Description of the Open-Source Toolkit produced within the context of the EU co-funded project UINFC2 - Engaging Users in Preventing and Fighting Cyber Crime that aims to facilitate an increase in the cooperation and coordination among all major EU stakeholders through the pro...
Download | View

Author(s): Dimitris Kavallieros
Title: GCC – A Cybercrime Center of Excellence for Training, Research and Education in Greece – Project Results

An overview of the results of the EU co-funded project Greece Cybercrime Center of Excellence. 

...
Download | View
Author(s): Dr. Nikos P. Frydas
Title: LEGAL IMPLICATIONS OF CRITICAL INFRASTRUCTURE PROTECTION; THE EXPERIENCE OF THE CYPRUS CYBERCRIME CENTER

Cyber related crime is an important aspect of Critical Infrastructure. The recent accession of Cyprus to the EU, its small size and its remoteness are important factors that have influenced its ability to characterize its CI’s as well as create (...
Download | View

Author(s): Tsadiras Alexandros, Bachtsetzis Christos-Stergios, Georgiou Michalis, Mylona Vasiliki, Boustras George
Title: Mitigating Circumstances in Cybercrime: a Position Paper

This paper argues the need for considering mitigating circumstances in cybercrime. Mitigating circumstances are conditions which moderate the culpability of an offender of a committed offence. Our argument is based on several observations. The cyberspace introduces a new famil...
Download | View

Author(s): Raian Ali, John McAlaney, Shamal Faily, Keith Phalp, Vasilios Katos
Title: Optimal Response to Epidemics and Cyber Attacks in Networks

This paper introduces novel formulations for optimally responding to epidemics and cyber attacks in networks. In our models, at a given time period, network nodes (e.g., users or com- puting resources) are associated with probabilities of being inf...
Download | View

Author(s): Noam Goldberg, Sven Leyffer, Ilya Safro
Title: Procedural Aspects of Cybercrime Investigation

Romanian legislation has had to adapt to new challenges. Following the ratification by our country of the provisions of the Council of Europe on cybercrime, in addition to substantive law provisions, procedural provisions have been introduced, which are intended to regulate th...
Download | View

Author(s): Alin Teodorus Dragan
Title: Research of Human Factors in Information Security

The article represents results of research of information security problem in social and human aspects. Authors assume that information sciences are usually focused on detecting and further processing of technical mechanisms and tools for support o...
Download | View

Author(s): Boris Ivanovich Skorodumov, Оlga Borisovna Skorodumova, Liliya Fedorovna Matronina
Title: Safeguarding Critical Infrastructures from Cyber Attacks: A Case Study for Offshore Natural Gas Assets

The majority of operations, as well as the physical and chemical processes, which take place on offshore Natural Gas installations are controlled by computer systems. These computer systems are vulnerable to cyber-attacks. If successful, such attacks can have disastrous and fa...
Download | View

Author(s): Hadjistassou Constantinos, Kyriakides Alexandros, Hadjiantonis Antonis M., Koutras Nikolaos, Charalambous Elisavet, Bratskas Romaios
Title: Spanish Centre of Excellence on Cybesecurity

The presentation gives an overview of the aims, deliverables and activities of the EU co-funded project Spanish Centre of Excellence on Cybesecurity.

...
Download | View
Author(s): Carlota Urruela
Title: Staying safe on social networks

The presentation focuses on measures on how to keep your online activity on social networks safe.

...
Download | View
Author(s): Alexis Michael
Title: Strengthening European Network Centers of Excellence in Cybercime – Partnership with key stakeholders

An overview of the aims and results of the EU co-funded project Lithuanian Cybercrime Center of Excellence as well a description of the SENTER project that aims to establish an international collaboration model among the European Cybercrime Centers of Excellence. 

...
Download | View
Author(s): Dr. Regina Valutyte
Title: The Rise in Cybercrime and the Dynamics of Exploiting the Human Vulnerability Factor

This paper is primarily intended to firstly define and review the literature in cybersecurity and vividly shed light on the mechanisms involved in the social engineering phenomenon. It will discuss the various attempts at network intrusion and the ...
Download | View

Author(s): Nabie Y. Conteh, Malcolm D. Royer
Title: Towards the Protection of Critical Information Infrastructures using a Lightweight, Non-intrusive Embedded System

Critical Infrastructures (CIs), such as those that are found in the energy, financial, transport, communications, water, health and national security sectors, are an essential pillar to the well-being of the national and international economy, secu...
Download | View

Author(s): Ελισσάβετ Χαραλάμπους, Skitsas Michael, Efstathiou Nectarios, Charalambous Elisavet, Efthymiou Costas, Koutras Nikolaos
Title: Towards the Protection of Critical Information Infrastructures using a Lightweight, Non-Intrusive Embedded System

The research focuses on cyber-attacks targeting SCADA systems of coastal gas exploitation plants, which can cause devastating effects in their production process. The process reveals the method where an attack changing the parameter in the gas liquefaction system can be perfor...
Download | View

Author(s): Ελισσάβετ Χαραλάμπους, Skitsas Michael, Efstathiou Nectarios, Charalambous Elisavet, Efthymiou Costas, Koutras Nikolaos
Title: V-Alert

Description of the EU Project V-ALERT which aims to support the establishment of an Information Security culture in different ICT user target groups (pupils and teachers, ICT students, academics and enterprise employees) by providing awareness and training through an innovativ...
Download | View

Author(s): Χρίστος Μεττούρης
Title: Γραφείο Ηλεκτρονικού Εγκλήματος

Description of the role and activities of the Cybercrime Unit, Cyprus Police 

...
Download | View
Author(s): Ανδρέας Αναστασιάδης
Title: Κυπριακό Κέντρο Αριστείας για το Κυβερνοέγκλημα

The presentation gives an overview of the aims, deliverables and activities of the EU co-funded project 3CE – Cyprus Cybercime Centre of Excellence. 

...
Download | View
Author(s): Κωνσταντίνος Τσιούρτος
Title: Τάσεις και μορφές Ηλεκτρονικού Εγκλήματος

The aim of the presentation is to provide the main trends and types of cybercrime which thread and affect the online activity of users. 

...
Download | View
Author(s): Δρ. Γιάννης Λαούρης