Abstract Today’s cybercrimes are much more difficult to detect and prosecute than traditional crimes. In the investigation of cybercrimes, law enforcement agencies follow similar techniques to traditional crimes that, however, have to be modified to meet the unique conditions and requirements of virtual space. This paper examines cybercrime profiling techniques prevalent today, and focuses on the feasibility of applying geographic profiling technique to cyber offenders. The primary assumption of the research is that for most types of cybercrime, the steps during the procedure of committing criminal act are not random. For example, the choice of the victim, the choice of crime location, similar characteristics, follow a certain logic, which could provide information about the offender’s crime. Testing the utility of a geographical profiling has been carried out on real cybercrime samples obtained by law enforcement agencies. This paper aims to apply the concept of geographic profiling to the issue of cybercrime that involve a physical world, targeting two types of cybercrimes: credit card skimming and spear phishing. Specially developed GeoCrime geographic profiling software designed to assist in the mapping, spatial and statistical analysis of cybercrime patterns was used. The results of the study have shown the possibility of applying geographic profiling to certain types of cybercrimes and under the certain conditions. The importance of geographic profiling is also emphasized, especially in situations where little is known about the offender, such as in cybercrime, where offenders use the Internet to hide their identities and activities.
This paper describes the test platform for verifying the functionality of network protocols and for optimization of their parameters. The test bed is made using combined OPNET simulator and MATLAB development environment. This test platform connects OPNET network protocols simulator with MATLAB development environment in the way that OPNET runs simulations of network traffic, with the predetermined parameter values, while MATLAB executes the script with a mathematical algorithm, which optimizes parameters listed in OPNET simulator.
The scope, scale, and intensity of real, as well as potential, attacks on the Smart Grid have been increasing and thus gaining more attention. An important component of the Smart Grid cybersecurity efforts addresses the availability and access to the power and related information and communications infrastructures. In this paper, we provide a holistic and methodical presentation of taxonomies and solutions for DoS attacks in the Smart Grid. The emerging threats of cybertattacks are raising serious concerns for many critical infrastructures. In this regards, The scope, scale, and intensity of real as well as potential attacks on the Smart Grid are on the rise and with devastating consequences. An important component of Smart Grid cyberse-curity efforts addresses the availability and access to the power and related information and communications infrastructures. In this paper, a holistic and methodical presentation of taxonomies and solution for DoS attacks in the Smart Grid is presented.
Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!
Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo
Saznaj više