Show simple item record

dc.contributor.authorAl-Khater, Wadha Abdullah
dc.contributor.authorAl-Ma’adeed, Somaya
dc.contributor.authorAhmed, Abdulghani Ali
dc.contributor.authorAl-Shakarchi, Ali
dc.contributor.authorKhan, Muhammad Khurram
dc.date.accessioned2020-08-03T08:53:40Z
dc.date.available2020-08-03T08:53:40Z
dc.date.issued2020-07-22
dc.identifier.citationW. A. Al-Khater, S. Al-Ma’adeed, A. A. Ahmed, A. S. Sadiq and M. K. Khan, Comprehensive review of cybercrime detection techniques, IEEE Access, 8, pp. 137293-137311 doi: 10.1109/ACCESS.2020.3011259.en
dc.identifier.issn2169-3536en
dc.identifier.doi10.1109/ACCESS.2020.3011259en
dc.identifier.urihttp://hdl.handle.net/2436/623411
dc.description© 2020 The Authors. Published by IEEE. This is an open access article available under a Creative Commons licence. The published version can be accessed at the following link on the publisher’s website: https://doi.org/10.1109/ACCESS.2020.3011259en
dc.description.abstractCybercrimes describe cases of indictable offences and misdemeanours in which computer or any communication tools are involved as targets, commission instruments, incidental to, or that cases are associated with the prevalence of computer technology. Common forms of cybercrimes could be child pornography, cyberstalking, identity theft, cyber laundering, credit card theft, cyber terrorism, drug sale, data leakage, sexually explicit content, phishing and other cyber hacking. These kinds of cybercrimes are mostly leading to breaching users’ privacy, security violation, business loss, financial fraud, or damage in public as well as government properties. Hence, this paper intensively reviews cybercrime detection and prevention methods. It first explores the different types of cybercrimes then discusses their threats against privacy and security in computer systems. It also describes the strategies that cybercriminals might utilize in committing these crimes against individuals, organizations, and societies. The paper then reviews the existing techniques of cybercrime detection and prevention. It objectively discusses the strengths and critically analyses the vulnerabilities of each technique. As a future study, the paper provides recommendations for the development of cybercrime detection model in which it is capable to effectively detect cybercrime in comparison to the existing techniques.en
dc.description.sponsorshipThis publication was made by NPRP grant # NPRP12S-0312-190332 from the Qatar National Research Fund (a member of the Qatar Foundation). The statements made herein are solely the responsibility of the authors.en
dc.formatapplication/pdfen
dc.language.isoenen
dc.publisherIEEEen
dc.relation.urlhttps://ieeexplore.ieee.org/document/9146148en
dc.subjectsecurityen
dc.subjectcybercrime detection techniquesen
dc.subjectneural networken
dc.subjectfuzzy logicen
dc.subjectmachine learningen
dc.subjectdata miningen
dc.titleComprehensive review of cybercrime detection techniquesen
dc.typeJournal articleen
dc.identifier.journalIEEE Accessen
dc.date.updated2020-07-14T13:27:11Z
dc.date.accepted2020-07-12
rioxxterms.funderUniversity of Wolverhamptonen
rioxxterms.identifier.projectNPRP12S-0312- 190332en
rioxxterms.versionVORen
rioxxterms.licenseref.urihttp://creativecommons.org/licenses/by/4.0/en
rioxxterms.licenseref.startdate2020-08-03en
refterms.dateFCD2020-08-03T08:52:33Z
refterms.versionFCDVOR
refterms.dateFOA2020-08-03T00:00:00Z


Files in this item

Thumbnail
Name:
Sadiq_Comprehensive_Review_of_ ...
Size:
4.069Mb
Format:
PDF

This item appears in the following Collection(s)

Show simple item record

http://creativecommons.org/licenses/by/4.0/
Except where otherwise noted, this item's license is described as http://creativecommons.org/licenses/by/4.0/