Investigating Various Approaches and Ways to Detect Cybercrime
Abstract
Keywords
Full Text:
PDFReferences
DM Chudasama, LK Sharma, et al. A comparative study of information systems auditing in Indian context. IPASJ International Journal of Information Technology (IIJIT). 2019; 7(4): 20–28.
DM Chudasama, LK Sharma, et al. Refine framework of information systems audits in Indian context. International Journal of Computer Sciences and Engineering. 2019; 7(5): 331–345.
DM Chudasama, Kathan Patel, et al. Awareness of data privacy breach in society. International Journal of All Research Education and Scientific Methods (IJARESM). 2020; 8(10): 303–307.
DM Chudasama, Darsh Patel, et al. Research on cybercrime and its policing. American Journal of Computer Science and Engineering Survey. 2020; 8(10): 3–14.
Soham Shah, M a Lokhandwala, and D M Chudasama. Decoding Farm Laws. International Journal of Scientific Research and Engineering Development. 2021; 4(2): 590-595.
Nihal Gulammahiyuddin Shaikh, Dhaval Chudasama. Research on cyber offenses under Information Technology Act, 2000. Recent Trends in Parallel Computing. 2021; 8(1): 14–20.
Raj Singh Deora, Dhaval Chudasama. Brief study of cybercrime on an internet. Journal of Communication Engineering & Systems. 2021; 11(1): 1–6.
Kathan Patel, Dhaval Chudasama. National security threats in cyberspace. National Journal of Cyber Security Law. 2021; 4(1): 12–20.
Dhaval Chudasama, Nikhil Rajput. Protecting ourselves from digital crimes. National Journal of Cyber Security Law. 2021; 4(1): 1–6.
Dhaval Chudasama. Strategies of the successful long term business. Journal of Commerce Management. 2021; 1(40): 1–5.
Dhaval Chudasama. Why choose cyber security as a career. Current Trends in Information Technology. 2021; 11(1): 14–19. 12. Nikhil Rajput, Dhaval Chudasama. Crime scene investigation (Murder). National Journal of Criminal Law. 2021; 4(1): 13–18.
Cyber Crime Investigation Manual. March 2011. https://jhpolice.gov.in/sites/default/files/ documentsreports/jhpolice_cyber_crime_investigation_manual.pdf
V Bhuse, A Gupta, A Al-Fuqaha. Detection of masquerade attacks on wireless sensor networks. 2007 IEEE International Conference on Communications. Glasgow, UK. 2007, June 24–28.
Kaspersky. Tips on how to protect yourself against cybercrime [Online]. Available from https://www.kaspersky.co.in/resource-center/threats/what-is-cybercrime.
J Balkin, J Grimmelmann, et al. Cybercrime: Digital cops in a networked environment. Journal of Information Privacy and Security. 2007; 3(1): 65–66.
FBI. Common scams and crimes [Online] Available from https://www.fbi.gov/scams-and-safety/common-scams-and-crimes.
Blackhawk Intelligence. How to identify cyber crime [Online] Available from: https://www.blackhawkintelligence.com/forensic-services/digital-forensics/cyber-crime-digital-forensics-1/identify-cyber-crime-1/.
Us Norton. 11 ways to help protect yourself against cybercrime [Online]. Available from: https://us.norton.com/internetsecurity-how-to-how-to-recognize-and-protect-yourself-from-cybercrime.html.
Dhaval Chudasama, Swapnil Gorasiya. Real world and cyber crime. Journal of Science. 2021; 1(31): 1–5.
DOI: https://doi.org/10.37591/jons.v9i2.829
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 Journal of Network Security
- eISSN: 2395–6739
- ISSN: 2321–8517