Digital Commons @ University of South Florida

  • USF Research
  • USF Libraries

Digital Commons @ USF > College of Behavioral and Community Sciences > Criminology > Theses and Dissertations

Criminology Theses and Dissertations

Theses/dissertations from 2024 2024.

Sociocultural Factors, Definitions, and Experiences of Intimate Partner Violence Among Latina and Hispanic Women , Vanessa Centelles

Theses/Dissertations from 2023 2023

Efficacy of Online Social Movements for Sparking Change: The Case of the Missing Murdered and Indigenous Women Movement (#MMIW) , Kacy A. Bleeker

An Examination of Racial Disparities in Arrest Across Florida Counties, 1998-2018: A Test of the Racial Threat and Political Representation Hypotheses , Xavier D. Burch

The Invisible Victims of Commercial Sexual Exploitation: Boys and Their Barriers to Access to Services , Amanda L. Connella

Damned & Damned: Examining Vexatious Litigation and the Vexatious Litigant Statute in Florida Courts , Sarah L. Harper

The Contributions of Mental Health Issues, Traumatic Brain Injury, and Adverse Childhood Experiences to Recidivism Among Rural Jail Incarcerees , Lauren N. Miley

Assessing the Relationship Between True Crime Documentary and Podcast Consumption, Fear of Crime, and Protective Behaviors , Lauren A. Tremblay

Police Officers’ Perceptions of Gunshot Detection Technology , Courtney L. Weber

Theses/Dissertations from 2022 2022

A Macro Social Examination of the Relationship Between Disabilities and Crime Using Neighborhood and County Level Data , Natasha A. Baloch

Racial Differences in Perceptions of Sanction Severity , Sarah L. Franklin

Juvenile Homicide Offenders: A Life-Course Perspective , Norair Khachatryan

Exploring the Effectiveness of a Life-Skills Program in a Florida Prison Through a Social Bond and General Strain Theory Perspective , Danielle M. Thomas

Theses/Dissertations from 2021 2021

Clean Water for All: Examining Safe Drinking Water Act Violations of Water Systems and Community Characteristics , Junghwan Bae

Morality and Offender Decision-Making: Testing the Empirical Relationship and Examining Methodological Implications , Jacquelyn Burckley

The Ring of Gyges 2.0: How Anonymity Providing Behaviors Affect Willingness to Participate in Online Deviance , Cassandra E. Dodge

A Macro Analysis of Illegal Hunting and Fishing Across Texas Counties: Using an Economic Structural Approach , Leo J. Genco Jr.

Self-Protection in Cyberspace: Assessing the Processual Relationship Between Thoughtfully Reflective Decision Making, Protection Motivation Theory, Cyber Hygiene, and Victimization , C. Jordan Howell

Racial Threat Theory: A Test of the Economic Threat Hypothesis , Carl L. Reeds

Online Perceptions of Panamanian Prisons and Incarcerated persons: An analysis of YouTube user comments , Mahaleth J. Sotelo

Theses/Dissertations from 2020 2020

Toxic Colonialism and Green Victimization of Native Americans: An Examination of the Genocidal Impacts of Uranium Mining , Averi R. Fegadel

Cross-National Incarceration Rates as Behavior of Law , Christopher J. Marier

The Effects of Perceived Motivations and Mental Distress on the Likelihood of Reporting and Engaging in Self-Protective Measures Among Victims of Stalking , Daniela Oramas Mora

Mental Health and In-Prison Experiences: Examining Socioeconomic and Sex Differences in the Effect of Mental Illness on Institutional Misconduct and Disciplinary Segregation , Rachel E. Severson

Theses/Dissertations from 2019 2019

Dating Application Facilitated Victimization: An Examination of Lifestyle-Routine Activities, Self-Control, and Self-Efficacy , Vanessa Centelles

Social Constructionism and Cultivation Theory in Development of the Juvenile “Super-Predator” , Elizabeth R. Jackson-Cruz

Bystander Intervention, Victimization, and Routine Activities Theory: An Examination of Feminist Routine Activities Theory in Cyber Space , Jennifer A. Leili

Sexual Assault and Robbery Disclosure: An Examination of Black’s Theory of the Behavior of Law , Caitlyn N. Muniz

Mass Shootings and Gun Sales: A Study on the Influence of Red and Blue Power , Maria Jose Rozo Osuna

A Multi-dimensional Macrolevel Study of Drug Enforcement Strategies, Heroin Prices, and Heroin Consumption Rates , Alexander G. Toth

Theses/Dissertations from 2018 2018

The Impact of a Religious/Spiritual Turning Point on Desistance: A Lifecourse Assessment of Racial/Ethnic Differences , Rhissa Briones Robinson

Political Decisions on Police Expenditures: Examining the Potential Relationship Between Political Structure, Police Expenditures and the Volume of Crime Across US States , Xavier D. Burch

Identifying the Personal and Perceived Organizational Characteristics Associated with Job Satisfaction Among Juvenile Probation Staff , Julie M. Krupa

The Role of Organizational Justice in Predicting Attitudes Toward Body-Worn Cameras in Police Officers , Nathaniel L. Lawshe

Yet Another Ferguson Effect: An Exploratory Content Analysis of News Stories on Police Brutality and Deadly Force Before and After the Killing of Michael Brown , Carl Root

The Role of Race/Ethnicity and Risk Assessment on Juvenile Case Outcomes , Tayler N. Shreve

Theses/Dissertations from 2017 2017

Intimate Partner Violence and the Capacity and Desire for Self-Control , Krista Taralynne Brewer

School Shootings in the United States from 1997 to 2012: A Content Analysis of Media Coverage , Victoria N. Iannuzzi

Chronic Runaway Youth: A Gender-Based Analysis , Michelle N. Jeanis

A Test of Wikström’s Situational Action Theory Using Self-Report Data on Intimate Partner Violence , Lauren Nicole Miley

An Exploratory Study of Macro-Social Correlates of Online Property Crime , Hyojong Song

Female Incarceration and Prison Social Order: An Examination of Gender Differences in Prison Misconduct and In-Prison Punishments , Elisa L. Toman

Adverse Childhood Experiences and Their Role as Mitigators for Youthful and Non-Youthful Offenders in Capital Sentencing Cases , Jessica R. Trapassi

Theses/Dissertations from 2016 2016

Disinhibition, Violence Exposure, and Delinquency: A Test of How Self-Control Affects the Impact of Exposure to Violence , Wyatt Brown

The Guilty But Mentally Ill Verdict: Assessing the Impact of Informing Jurors of Verdict Consequences , Erin Elizabeth Cotrone

The Relationship between Psychopathic Personality Traits and Lying , Jason A. Dobrow

Delving into the Heart of Victimization Risk: Examining the Interactive Relationship between Demographic Factors and Context , Amy Sheena Eggers

A Power Conflict Approach to Animal Cruelty: Examining How Economic Power Influences the Creation of Animal Cruelty Laws , Leonard J. Genco

The Role of Gender in Self-Control and Intimate Partner Violence , Laura Marie Gulledge

The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System , Christian Jordan-Michael Howell

Tactics of Sexual Control and Negative Health Outcomes , Anna Elizabeth Kleppe

The Applicability of Criminology to Terrorism Studies: An Exploratory Study of ISIS Supporters in the United States , Amanda Marie Sharp Parker

The Path to Violent Behavior: The Harmful Aftermath of Childhood Trauma , Nicholas Michael Perez

The Effects of Racial Bias on Perceptions of Intimate Partner Violence Scenarios , Batya Yisraela Rubenstein

Theses/Dissertations from 2015 2015

Reel or Reality? The Portrayal of Prostitution in Major Motion Pictures , Raleigh Blasdell

Psychopathy and Perception of Vulnerability , Barbara Joyce Dinkins

Effect of Empathy on Death Penalty Support in Relation to the Racial Divide and Gender Gap , Brian Godcharles

Exploring the Interactive Effects of Social Learning Theory and Psychopathy on Serious Juvenile Delinquency , Brandy Barenna Henderson

Tampa Electric Company's Big Bend Utility Plant in Hillsborough County, Florida: A Case Study , Lynne M. Hodalski-Champagne

Thirty Year Follow-Up of Juvenile Homicide Offenders , Norair Khachatryan

Organized Crime in Insurance Fraud: An Empirical Analysis of Staged Automobile Accident Rings , Chris Longino

The Role of Social Support in the Disclosure and Recovery Process of Rape Victims , Jessica Nicole Mitchell

Evaluating the Social Control of Banking Crimes: An Examination of Anti-Money Laundering Deficiencies and Industry Success , Erin M. Mulligan

Elite Deviance, Organized Crime, and Homicide: A Cross-National Quantitative Analysis , Carol L.s. Trent

An Evaluation of the Utah First District Mental Health Court: Gauging the Efficacy of Diverting Offenders Suffering With Serious Mental Illness , Stephen Guy VanGeem

Rape, Race, and Capital Punishment in North Carolina: A Qualitative Approach to Examining an Enduring Cultural Legacy , Douglas Wholl

Theses/Dissertations from 2014 2014

The Tattoo: A Mark of Subversion, Deviance, or Mainstream Self-Expression? , Jocelyn Camacho

Juvenile and Adult Involvement in Double Parricide and Familicide in the U.S.: An Empirical Analysis of 20 Years of Data , Averi Rebekah Fegadel

Predicting Successful Drug Court Graduation: Exploring Demographic and Psychosocial Factors among Medication-Assisted Drug Court Treatment Clients , Autumn Michelle Frei

Experimentally Evaluating Statistical Patterns of Offending Typology For Burglary: A Replication Study , Lance Edwin Gilmore

Developmental Trajectories of Physical Aggression and Nonaggressive Rule-Breaking among At-risk Males and Females during Late Childhood and Early Adolescence , Eugena Givens

Predicting Fear of Crime using a Multilevel and Multi-Model Approach: A Study in Hillsborough County , Jonathan Maskaly

Public Knowledge and Sentiments about Elite Deviance , Cedric Michel

The Influence of Community Context on Social Control: A Multi-Level Examination of the Relationship between Race/Ethnicity, Drug Offending, and Juvenile Court Outcomes , Jennifer Peck

Theses/Dissertations from 2013 2013

Assessing the Relationship Between Hotspots of Lead and Hotspots of Crime , Kimberly L. Barrett

A Life-Course Approach to Sexual Offending: Examining the Continuity of Juvenile Sexual Offending into Adulthood and Subsequent Patterns of Recidivism , Maude Beaudry-Cyr

Examining the link between self-control and misconduct in a multi-agency sample of police supervisors: A test of two theories , Christopher Matthew Donner

The Impact of Hyperfemininity on Explicit and Implicit Blame Assignment and Police Reporting of Alcohol Facilitated Rape in a Sample of College Women , Sarah Ehlke

Rurality and Intimate Partner Homicide: Exploring the Relationship between Place, Social Structure, and Femicide in North Carolina , Amelia Kirkland

Self-Control, Attitudinal Beliefs, and White-Collar Crime Intentions , Melissa Anne Lugo

Zero Tolerance for Marginal Populations: Examining Neoliberal Social Controls in American Schools , Brian Gregory Sellers

State-Corporate Crime in the Democratic Republic of Congo , Veronica Jane Winters

Theses/Dissertations from 2012 2012

The Walls Are Closing In: Comparing Property Crime Victimization Risk In Gated And Non-Gated Communities , Nicholas Branic

What Propels Sexual Homicide Offenders? Testing an Integrated Theory of Social Learning and Routine Activities Theories , Heng Choon Chan

A Deadly Way of Doing Business: A Case Study of Corporate Crime in the Coal Mining Industry , Charles Nickolas Stickeler

Deconstructing the "Power and Control Motive": Developing and Assessing the Measurability of Internal Power , Shelly Marie Wagers

Theses/Dissertations from 2011 2011

Assessing racial differences in offending trajectories: A life-course view of the race-crime relationship , Michael S. Caudy

Mental Health Courts Effectiveness in Reducing Recidivism and Improving Clinical Outcomes: A Meta-Analysis , Brittany Cross

General Strain Theory and Juvenile Delinquency: A Cross-Cultural Study , Wen-Hsu Lin

General Strain Theory, Race, and Delinquency , Jennifer Peck

Developmental Trajectories of Self-Control: Assessing the Stability Hypothesis , James Vance Ray

Explaining the "Female Victim Effect" in Capital Sentencing Decisions: A Case for Sex-Specific Models of Capital Sentencing Research , Tara N. Richards

A Multilevel Model of Police Corruption: Anomie, Decoupling, and Moral Disengagement , Ruth Zschoche

Theses/Dissertations from 2010 2010

The Emotional Guardianship of Foreign-Born and Native-Born Hispanic Youth and Its Effect on Violent Victimization , Amy Sheena Eggers

The Influence of Narcissism and Self-Control on Reactive Aggression , Melissa L. Harrison

Is There an "Innocent Female Victim" Effect in Capital Punishment Sentencing? , Amelia Lane Kirkland

An Analysis of the Influence of Sampling Methods on Estimation of Drug Use Prevalence and Patterns Among Arrestees in the United States: Implications for Research and Policy , Janine Kremling

A Pathway to Child Sex Trafficking in Prostitution: The Impact of Strain and Risk-Inflating Responses , Joan A. Reid

Victimization Among Individuals With Low Self-Control: Effects on Fear Versus Perceived Risk of Crime , Casey Williams

Theses/Dissertations from 2009 2009

Domestic Violence Within Law Enforcement Families: The Link Between Traditional Police Subculture and Domestic Violence Among Police , Lindsey Blumenstein

Rape Attitudes and Beliefs: A Replication Study , Rhissa Emily Briones

Advanced Search

  • Email Notifications and RSS
  • All Collections
  • USF Faculty Publications
  • Open Access Journals
  • Conferences and Events
  • Theses and Dissertations
  • Textbooks Collection

Useful Links

  • Rights Information
  • SelectedWorks
  • Submit Research

Home | About | Help | My Account | Accessibility Statement | Language and Diversity Statements

Privacy Copyright

  • My Shodhganga
  • Receive email updates
  • Edit Profile

Shodhganga : a reservoir of Indian theses @ INFLIBNET

  • Shodhganga@INFLIBNET
  • Savitribai Phule Pune University
  • Ramkrishna More Arts Commerce and Science College
Title: Cyber Crime in Banking Sector the Study of Customers perception and Responses
Researcher: Bhave, Shobha Suresh
Guide(s): 
Keywords: Banking and Finance
Business
Customers perception
Cyber
Cyber Crime
Economics and Business
Social Sciences
University: Savitribai Phule Pune University
Completed Date: 2022
Abstract: newline
Pagination: 
URI: 
Appears in Departments:
File Description SizeFormat 
Attached File432.93 kBAdobe PDF
1.13 MBAdobe PDF
329.44 kBAdobe PDF
747.78 kBAdobe PDF
614.43 kBAdobe PDF
556.77 kBAdobe PDF
674.94 kBAdobe PDF
1.52 MBAdobe PDF
612.3 kBAdobe PDF
380.22 kBAdobe PDF
624.83 kBAdobe PDF

Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Shodhganga

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

jcp-logo

Article Menu

cyber crime dissertation pdf

  • Subscribe SciFeed
  • Author Biographies
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Knowledge graphs and semantic web tools in cyber threat intelligence: a systematic literature review.

cyber crime dissertation pdf

1. Introduction

Contribution, 2. literature selection strategy, 3.1. ontology and knowledge graph construction, 3.2. utilization of ontologies and knowledge graphs, 3.3. machine learning and deep learning applications, 3.3.1. deep learning methods in data extraction, 3.3.2. other uses of machine learning and deep learning, 4. discussion, 5. concluding remarks, 5.1. contribution, 5.2. future work, author contributions, data availability statement, acknowledgments, conflicts of interest, abbreviations.

AARsAfter Action Reports
ACTSemi-Automated Cyber Threat Intelligence
ADACOAttack and Defense Analysis of Cybersecurity Ontology
AHGAttack Hypothesis Generator
AIArtificial Intelligence
AMLAdversarial Machine Learning
APTAdvanced Persistent Threat
BERTBidirectional Encoder Representations from Transformers
BiLSTMBidirectional Long Short-Term Memory
CFRaaSCloud Forensic Readiness as a Service
CNNConvolutional Neural Network
CRFConditional Random Fields
CTICyber Threat Intelligence
CVECommon Vulnerabilities and Exposures
CVSSCommon Vulnerability Scoring System
CybOXCyber Observable eXpression
DFAXDigital Forensic Analysis eXpression
DLDeep Learning
DRAFDynamic Risk Assessment Framework
FFNNFeed-Forward Neural Network
GBoostGradient Boosting
GNNGraph Neural Network
GRUGated Recurrent Unit
IDRSIntrusion Detection and Response Systems
IDSIntrusion Detection System
IoCIndicators of Compromise
IODEFIncident Object Description Exchange Format
IoTInternet of Things
IPInternet Protocol
IRInformation Retrieval
ITInformation Technology
KGKnowledge Graph
KGaaSKnowledge Graph as a Service
KGCNKnowledge Graph Convolutional Network
LLMLarge Language Model
MAPMean Average Precision
MEEMalware Entity Extractor
MLMachine Learning
NERNamed Entity Recognition
NLPNatural Language Processing
NNNeural Network
NSMNetwork Security Monitoring
NVDNational Vulnerability Database
OSINTOpen-Source Intelligence
OWLWeb Ontology Language
R-MGATRelational Multi-Head Graph Attention Network
RDFResource Description Framework
RelExtRelationship Extractor
RFRandom Forest
RLReinforcement Learning
S-MAIDSSemantic Model of Automated Intrusion Detection Systems
SIEMSecurity Information Event Management
SMEsSmall- and Medium-sized Enterprises
STIXStructured Threat Information eXpression
SWRLSemantic Web Rule Language
TALThreat Agent Library
TEPAThreat Evolution Prediction Algorithm
TTPTactics, Techniques and Procedures
UIUser Interfaces
URLUniform Resource Locator
USEUniversal Sentence Encoder
XSSCross-Site Scripting
  • The Latest 2024 Cyber Crime Statistics (Updated March 2024). Available online: https://aag-it.com/the-latest-cyber-crime-statistics/ (accessed on 2 April 2024).
  • Top Concerns Industry Leaders Have about Cyberattacks in 2024 and beyond. Available online: https://www.ibm.com/blog/top-concerns-industry-leaders-have-about-cyberattacks-in-2024-and-beyond/ (accessed on 2 April 2024).
  • Sun, N.; Ding, M.; Jiang, J.; Xu, W.; Mo, X.; Tai, Y.; Zhang, J. Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives. IEEE Commun. Surv. Tutorials 2023 , 25 , 1748–1774. [ Google Scholar ] [ CrossRef ]
  • What Is Cyber Threat Intelligence? Available online: https://www.microsoft.com/en-us/security/business/security-101/what-is-cyber-threat-intelligence (accessed on 5 April 2024).
  • What Is Cyber Threat Intelligence? Available online: https://www.cisco.com/c/en/us/products/security/what-is-cyber-threat-intelligence.html (accessed on 5 April 2024).
  • Saeed, S.; Suayyid, S.A.; Al-Ghamdi, M.S.; Al-Muhaisen, H.; Almuhaideb, A.M. A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. Sensors 2023 , 23 , 7273. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Mavroeidis, V.; Bromander, S. Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence. In Proceedings of the 2017 European Intelligence and Security Informatics Conference (EISIC), Athens, Greece, 11–13 September 2017; pp. 91–98. [ Google Scholar ] [ CrossRef ]
  • Available online: https://stixproject.github.io/ (accessed on 10 May 2024).
  • Asgarli, E.; Burger, E. Semantic ontologies for cyber threat sharing standards. In Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST), Waltham, MA, USA, 10–11 May 2016. [ Google Scholar ] [ CrossRef ]
  • Merah, Y.; Kenaza, T. Proactive Ontology-based Cyber Threat Intelligence Analytic. In Proceedings of the 2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI), Tebessa, Algeria, 21–22 September 2021. [ Google Scholar ] [ CrossRef ]
  • Bratsas, C.; Kapsas, G.; Konstantinidis, S.; Koutsouridis, G.; Bamidis, P.D. A semantic wiki within moodle for Greek medical education. In Proceedings of the 2009 22nd IEEE International Symposium on Computer-Based Medical Systems, Albuquerque, NM, USA, 2–5 August 2009; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Bratsas, C.; Koutkias, V.; Kaimakamis, E.; Bamidis, P.; Maglaveras, N. Ontology-Based Vector Space Model and Fuzzy Query Expansion to Retrieve Knowledge on Medical Computational Problem Solutions. In Proceedings of the 2007 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Lyon, France, 22–26 August 2007; pp. 3794–3797. [ Google Scholar ] [ CrossRef ]
  • Antoniou, P.E.; Chondrokostas, E.; Bratsas, C.; Filippidis, P.M.; Bamidis, P.D. A Medical Ontology Informed User Experience Taxonomy to Support Co-creative Workflows for Authoring Mixed Reality Medical Education Spaces. In Proceedings of the 2021 7th International Conference of the Immersive Learning Research Network (iLRN), Eureka, CA, USA, 17–10 June 2021; pp. 1–9. [ Google Scholar ] [ CrossRef ]
  • Spyropoulos, A.Z.; Kornilakis, A.; Makris, G.C.; Bratsas, C.; Tsiantos, V.; Antoniou, I. Semantic Representation of the Intersection of Criminal Law & Civil Tort. Data 2022 , 7 , 176. [ Google Scholar ] [ CrossRef ]
  • Spyropoulos, A.Z.; Bratsas, C.; Makris, G.C.; Garoufallou, E.; Tsiantos, V. Interoperability-Enhanced Knowledge Management in Law Enforcement: An Integrated Data-Driven Forensic Ontological Approach to Crime Scene Analysis. Information 2023 , 14 , 607. [ Google Scholar ] [ CrossRef ]
  • Filippidis, P.M.; Dimoulas, C.; Bratsas, C.; Veglis, A. A unified semantic sports concepts classification as a key device for multidimensional sports analysis. In Proceedings of the 2018 13th International Workshop on Semantic and Social Media Adaptation and Personalization (SMAP), Zaragoza, Spain, 6–7 September 2018; pp. 107–112. [ Google Scholar ] [ CrossRef ]
  • Filippidis, P.M.; Dimoulas, C.A.; Bratsas, C.; Veglis, A.A. A Multimodal Semantic Model For Event Identification On Sports Media Content. J. Media Crit. 2018 , 4 , 295–306. [ Google Scholar ]
  • Bratsas, C.; Chrysou, D.E.; Eftychiadou, E.; Kontokostas, D.; Bamidis, P.D.; Antoniou, I. Semantic Web Game Based Learning: An I18n approach with Greek DBpedia. In Proceedings of the LiLe@WWW, Lyon, France, 17 April 2012. [ Google Scholar ]
  • Kontokostas, D.; Bratsas, C.; Auer, S.; Hellmann, S.; Antoniou, I.; Metakides, G. Internationalization of Linked Data: The case of the Greek DBpedia edition. J. Web Semant. 2012 , 15 , 51–61. [ Google Scholar ] [ CrossRef ]
  • Lange, C.; Ion, P.; Dimou, A.; Bratsas, C.; Sperber, W.; Kohlhase, M.; Antoniou, I. Bringing Mathematics to the Web of Data: The Case of the Mathematics Subject Classification. In Semantic Web: Research and Applications ; Simperl, E., Cimiano, P., Polleres, A., Corcho, O., Presutti, V., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; pp. 763–777. [ Google Scholar ]
  • Karampatakis, S.; Bratsas, C.; Zamazal, O.; Filippidis, P.M.; Antoniou, I. Alignment: A Hybrid, Interactive and Collaborative Ontology and Entity Matching Service. Information 2018 , 9 , 281. [ Google Scholar ] [ CrossRef ]
  • Bratsas, C.; Chondrokostas, E.; Koupidis, K.; Antoniou, I. The Use of National Strategic Reference Framework Data in Knowledge Graphs and Data Mining to Identify Red Flags. Data 2021 , 6 , 2. [ Google Scholar ] [ CrossRef ]
  • Rastogi, N.; Dutta, S.; Zaki, M.; Gittens, A.; Aggarwal, C. MALOnt: An Ontology for Malware Threat Intelligence. In Proceedings of the First International Workshop, MLHat 2020, San Diego, CA, USA, 24 August 2020; Volume 1271, pp. 28–44. [ Google Scholar ] [ CrossRef ]
  • Wang, P.; Dai, G.; Zhai, L. Event-Based Threat Intelligence Ontology Model. In Proceedings of the 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, 11–14 July 2023; Volume 14299, pp. 261–282. [ Google Scholar ] [ CrossRef ]
  • Dora, J.; Nemoga, K. Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity. J. Cybersecur. Priv. 2021 , 1 , 319–339. [ Google Scholar ] [ CrossRef ]
  • Grigoriadis, C.; Berzovitis, A.; Stellios, I.; Kotzanikolaou, P. A Cybersecurity Ontology to Support Risk Information Gathering in Cyber-Physical Systems. In Proceedings of the CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, 4–8 October 2022; Volume 13106, pp. 23–39. [ Google Scholar ] [ CrossRef ]
  • Piplai, A.; Mittal, S.; Joshi, A.; Finin, T.; Holt, J.; Zak, R. Creating Cybersecurity Knowledge Graphs from Malware after Action Reports. IEEE Access 2020 , 8 , 211691–211703. [ Google Scholar ] [ CrossRef ]
  • Yang, F.; Han, Y.; Ding, Y.; Tan, Q.; Xu, Z. A flexible approach for cyber threat hunting based on kernel audit records. Cybersecurity 2022 , 5 , 11. [ Google Scholar ] [ CrossRef ]
  • Li, Y.; Guo, Y.; Fang, C.; Liu, Y.; Chen, Q. A Novel Threat Intelligence Information Extraction System Combining Multiple Models. Secur. Commun. Netw. 2022 , 2022 , 8477260. [ Google Scholar ] [ CrossRef ]
  • Ahmed, K.; Khurshid, S.K.; Hina, S. CyberEntRel: Joint extraction of cyber entities and relations using deep learning. Comput. Secur. 2024 , 136 , 103579. [ Google Scholar ] [ CrossRef ]
  • Khairkar, A.; Kshirsagar, D.; Kumar, S. Ontology for Detection of Web Attacks. In Proceedings of the 2013 International Conference on Communication Systems and Network Technologies, Gwalior, India, 6–8 April 2013; pp. 612–615. [ Google Scholar ] [ CrossRef ]
  • Strasburg, C.; Basu, S.; Wong, J. S-MAIDS: A semantic model for automated tuning, correlation, and response selection in intrusion detection systems. In Proceedings of the 2013 IEEE 37th Annual Computer Software and Applications Conference, Kyoto, Japan, 22–26 July 2013; pp. 319–328. [ Google Scholar ] [ CrossRef ]
  • Burger, E.; Goodman, M.; Kampanakis, P.; Zhu, K. Taxonomy model for cyber threat intelligence information exchange technologies. In Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, Scottsdale, AZ, USA, 3 November 2014; pp. 51–60. [ Google Scholar ] [ CrossRef ]
  • Casey, E.; Back, G.; Barnum, S. Leveraging CybOX™ to standardize representation and exchange of digital forensic information. Digit. Investig. 2015 , 12 , S102–S110. [ Google Scholar ] [ CrossRef ]
  • Available online: https://cyboxproject.github.io/ (accessed on 21 May 2024).
  • Meckl, S.; Tecuci, G.; Boicu, M.; Marcu, D. Towards an Operational Semantic Theory of Cyber Defense against Advanced Persistent Threats ; George Mason University: Fairfax, VA, USA, 2015; Volume 1523, pp. 58–65. [ Google Scholar ]
  • Falk, C. An Ontology for Threat Intelligence. In Proceedings of the European Conference on Cyber Warfare and Security, Munich, Germany, 7–8 July 2016. [ Google Scholar ]
  • Mohsin, M.; Anwar, Z. Where to Kill the Cyber Kill-Chain: An Ontology-Driven Framework for IoT Security Analytics. In Proceedings of the 2016 International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, 19–21 December 2017; pp. 23–28. [ Google Scholar ] [ CrossRef ]
  • Qamar, S.; Anwar, Z.; Rahman, M.A.; Al-Shaer, E.; Chu, B.T. Data-driven analytics for cyber-threat intelligence and information sharing. Comput. Secur. 2017 , 67 , 35–58. [ Google Scholar ] [ CrossRef ]
  • Mavroeidis, V.; Josang, A.; ACM. Data-Driven Threat Hunting Using Sysmon. In Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, Guiyang, China, 16–19 March 2018; pp. 82–88. [ Google Scholar ] [ CrossRef ]
  • Diederichsen, L.; Choo, K.K.; Le-Khac, N.A. A Graph Database-Based Approach to Analyze Network Log Files. In Proceedings of the 13th International Conference, NSS 2019, Sapporo, Japan, 15–18 December 2019; Volume 11928, pp. 53–73. [ Google Scholar ] [ CrossRef ]
  • Doynikova, E.; Fedorchenko, A.; Kotenko, I. Ontology of metrics for cyber security assessment. In Proceedings of the 14th International Conference on Availability, Reliability and Security, Canterbury, UK, 26–29 August 2019. [ Google Scholar ] [ CrossRef ]
  • Kim, M.; Dey, S.; Lee, S.W. Ontology-driven security requirements recommendation for APT attack. In Proceedings of the 2019 IEEE 27th International Requirements Engineering Conference Workshops (REW), Jeju, Republic of Korea, 23–27 September 2019; pp. 150–156. [ Google Scholar ] [ CrossRef ]
  • Liu, Z.; Sun, Z.; Chen, J.; Zhou, Y.; Yang, T.; Yang, H.; Liu, J. STIX-based Network Security Knowledge Graph Ontology Modeling Method. In Proceedings of the 2020 3rd International Conference on Geoinformatics and Data Analysis, Marseille, France, 15–17 April 2020; pp. 152–157. [ Google Scholar ] [ CrossRef ]
  • Piplai, A.; Mittal, S.; Abdelsalam, M.; Gupta, M.; Joshi, A.; Finin, T. Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior. In Proceedings of the 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), Arlington, VA, USA, 9–10 November 2020; pp. 47–52. [ Google Scholar ] [ CrossRef ]
  • Sills, M.; Ranade, P.; Mittal, S. Cybersecurity Threat Intelligence Augmentation and Embedding Improvement—A Healthcare Usecase. In Proceedings of the 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), Arlington, VA, USA, 9–10 November 2020; pp. 62–67. [ Google Scholar ] [ CrossRef ]
  • Vrandečić, D.; Krötzsch, M. Wikidata: A free collaborative knowledgebase. Commun. ACM 2014 , 57 , 78–85. [ Google Scholar ] [ CrossRef ]
  • Available online: https://accessgudid.nlm.nih.gov/ (accessed on 22 May 2024).
  • Hutschenreuter, H.; Çakmakçı, S.; Maeder, C.; Kemmerich, T. Ontology-based Cybersecurity and Resilience Framework. In Proceedings of the 7th International Conference on Information Systems Security and Privacy, Virtual, 11–13 February 2021; pp. 458–466. [ Google Scholar ] [ CrossRef ]
  • Mavroeidis, V.; Hohimer, R.; Casey, T.; Jesang, A. Threat Actor Type Inference and Characterization within Cyber Threat Intelligence. In Proceedings of the 2021 13th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, 25–28 May 2021; pp. 327–352. [ Google Scholar ] [ CrossRef ]
  • Merah, Y.; Kenaza, T. Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence. In Proceedings of the 16th International Conference on Availability, Reliability and Security, Vienna, Austria, 17–20 August 2021. [ Google Scholar ] [ CrossRef ]
  • Ammi, M.; Adedugbe, O.; Alharby, F.; Benkhelifa, E. Leveraging a cloud-native architecture to enable semantic interconnectedness of data for cyber threat intelligence. Clust. Comput. 2022 , 25 , 3629–3640. [ Google Scholar ] [ CrossRef ]
  • Bromander, S.; Swimmer, M.; Muller, L.; Jøsang, A.; Eian, M.; Skjøtskift, G.; Borg, F. Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange. Digit. Threat. Res. Pract. 2022 , 3 , 1–22. [ Google Scholar ] [ CrossRef ]
  • Collen, A.; Nijdam, N. Can I Sleep Safely in My Smarthome? A Novel Framework on Automating Dynamic Risk Assessment in IoT Environments. Electronics 2022 , 11 , 1123. [ Google Scholar ] [ CrossRef ]
  • National Vulnerability Database. Available online: https://nvd.nist.gov/ (accessed on 17 May 2024).
  • Huang, C.C.; Huang, P.Y.; Kuo, Y.R.; Wong, G.W.; Huang, Y.T.; Sun, Y.; Chang Chen, M. Building Cybersecurity Ontology for Understanding and Reasoning Adversary Tactics and Techniques. In Proceedings of the 2022 IEEE International Conference on Big Data (Big Data), Osaka, Japan, 17–20 December 2022; pp. 4266–4274. [ Google Scholar ] [ CrossRef ]
  • Li, Z.; Zeng, J.; Chen, Y.; Liang, Z. AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports. In Proceedings of the 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, 26–30 September 2022; Volume 13554, pp. 589–609. [ Google Scholar ] [ CrossRef ]
  • Satvat, K.; Gjomemo, R.; Venkatakrishnan, V. Extractor: Extracting Attack Behavior from Threat Reports. In Proceedings of the 2021 IEEE European Symposium on Security and Privacy (EuroS&P), Vienna, Austria, 6–10 September 2021; pp. 598–615. [ Google Scholar ]
  • Husari, G.; Al-Shaer, E.; Ahmed, M.; Chu, B.; Niu, X. TTPDrill: Automatic and accurate extraction of threat actions from unstructured text of CTI Sources. In Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, 4–8 December 2017; Volume F132521, pp. 103–115. [ Google Scholar ] [ CrossRef ]
  • Rastogi, N.; Dutta, S.; Gittens, A.; Zaki, M.; Aggarwal, C. TINKER: A framework for Open source Cyberthreat Intelligence. In Proceedings of the 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Wuhan, China, 9–11 December 2022; pp. 1569–1574. [ Google Scholar ] [ CrossRef ]
  • Sharma, K.; Kumar, A. A Graph Database-Based Method for Network Log File Analysis. In Proceedings of the 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India, 16–17 December 2022; pp. 545–550. [ Google Scholar ] [ CrossRef ]
  • Akbar, K.; Rahman, F.; Singhal, A.; Khan, L.; Thuraisingham, B. The Design and Application of a Unified Ontology for Cyber Security. In Proceedings of the 19th International Conference, ICISS 2023, Raipur, India, 16–20 December 2023; Volume 14424, pp. 23–41. [ Google Scholar ] [ CrossRef ]
  • Compastié, M.; López Martínez, A.; Fernández, C.; Gil Pérez, M.; Tsarsitalidis, S.; Xylouris, G.; Mlakar, I.; Kourtis, M.; Šafran, V. PALANTIR: An NFV-Based Security-as-a-Service Approach for Automating Threat Mitigation. Sensors 2023 , 23 , 1658. [ Google Scholar ] [ CrossRef ]
  • Dora, J.; Hluchý, L.; Nemoga, K. Ontology for Blind SQL Injection. Comput. Inform. 2023 , 42 , 480–500. [ Google Scholar ] [ CrossRef ]
  • Sánchez-Zas, C.; Villagrá, V.; Vega-Barbas, M.; Larriva-Novo, X.; Moreno, J.; Berrocal, J. Ontology-based approach to real-time risk management and cyber-situational awareness. Future Gener. Comput. Syst. 2023 , 141 , 462–472. [ Google Scholar ] [ CrossRef ]
  • Riesco, R.; Villagrá, V.A. Leveraging cyber threat intelligence for a dynamic risk framework. Int. J. Inf. Secur. 2019 , 18 , 715–739. [ Google Scholar ] [ CrossRef ]
  • Duque-Ramos, A.; Fernandez-Breis, J.; Stevens, R.; Aussenac-Gilles, N. OQuaRE: A SQuaRE-based approach for evaluating the quality of ontologies. J. Res. Pract. Inf. Technol. 2011 , 43 , 159–176. [ Google Scholar ]
  • Zhang, S.; Su, X.; Shi, P.; Du, T.; Han, Y. Threat Modeling and Application Research Based on Multi-Source Attack and Defense Knowledge. Comput. Mater. Contin. 2023 , 77 , 349–377. [ Google Scholar ] [ CrossRef ]
  • Takahashi, T.; Kadobayashi, Y. Mechanism for linking and discovering structured cybersecurity information over networks. In Proceedings of the 2014 IEEE International Conference on Semantic Computing, Newport Beach, CA, USA, 16–18 June 2014; pp. 279–284. [ Google Scholar ] [ CrossRef ]
  • Takahashi, T.; Kadobayashi, Y.; Fujiwara, H. Ontological approach toward cybersecurity in cloud computing. In Proceedings of the International Conference on Security of Information and Networks, Taganrog, Russia, 7–11 September 2010. [ Google Scholar ]
  • Lu, S.; Kokar, M. A Situation Assessment Framework for Cyber Security Information Relevance Reasoning. In Proceedings of the 2015 18th International Conference on Information Fusion (Fusion), Washington, DC, USA, 6–9 July 2015; pp. 1459–1466. [ Google Scholar ]
  • Takahashi, T.; Landfield, K.; Kadobayashi, Y. An Incident Object Description Exchange Format (IODEF) Extension for Structured Cybersecurity Information ; RFC 7203; RFC Editor: Marina del Rey, CA, USA, 2014. [ Google Scholar ] [ CrossRef ]
  • Monteiro, M.; Sarmento, T.; Barreto, A.; Costa, P. A holistic approach to evaluate cyber threat. STIDS 2016 , 1788 , 64–68. [ Google Scholar ]
  • de Barros Barreto, A. Cyber-ARGUS Framework—Measuring Cyber-Impact on the Mission. Ph.D. Thesis, Instituto Tecnológico de Aeronáutica, São José dos Campos, São Paulo, Brazil, 2013. [ Google Scholar ]
  • Mozzaquatro, B.; Jardim-Goncalves, R.; Agostinho, C. Situation awareness in the Internet of Things. In Proceedings of the 2017 International Conference on Engineering, Technology and Innovation (ICE/ITMC), Madeira, Portugal, 27–29 June 2017; pp. 982–990. [ Google Scholar ] [ CrossRef ]
  • Sikos, L.F. Handling Uncertainty and Vagueness in Network Knowledge Representation for Cyberthreat Intelligence. In Proceedings of the 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Rio de Janeiro, Brazil, 8–13 July 2018; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Bourai, S.B.; Mokhtari, A.; Khellaf, F. Poss–SROIQ (D): Possibilistic description logic extension toward an uncertain geographic ontology. New Trends Databases Inf. Syst. 2014 , 241 , 277–286. [ Google Scholar ]
  • Klinov, P.; Parsia, B. Understanding a probabilistic description logic via connections to first-order logic of probability. In Proceedings of the International Workshop on Uncertainty Reasoning for the Semantic Web, Karlsruhe, Germany, 26 October 2008; pp. 41–58. [ Google Scholar ]
  • Bal-Bourai, S.; Mokhtari, A. SROIQ (D): Possibilistic Description Logic for Uncertain Geographic Information. In Proceedings of the International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, Morioka, Japan, 2–4 August 2016; pp. 818–829. [ Google Scholar ]
  • Bobillo, F.; Straccia, U. Reasoning with the finitely many-valued Łukasiewicz fuzzy description logic SROIQ. Inf. Sci. 2011 , 181 , 758–778. [ Google Scholar ] [ CrossRef ]
  • Aviad, A.; Wecel, K. Cyber Treat Intelligence Modeling. In Proceedings of the 22nd International Conference, BIS 2019, Seville, Spain, 26–28 June 2019; Volume 353, pp. 361–370. [ Google Scholar ] [ CrossRef ]
  • Available online: https://www.maltego.com/ (accessed on 20 May 2024).
  • Najafi, P.; Mühle, A.; Pünter, W.; Cheng, F.; Meinel, C.; ACM. MalRank: A Measure of Maliciousness in SIEM-based Knowledge Graphs. In Proceedings of the 35th Annual Computer Security Applications Conference, San Juan, PR, USA, 9–13 December 2019; pp. 417–429. [ Google Scholar ] [ CrossRef ]
  • Available online: https://github.com/HewlettPackard/sandpiper (accessed on 21 May 2024).
  • Kebande, V.; Karie, N.; Ikuesan, R.; Venter, H. Ontology-driven perspective of CFRaaS. Wiley Interdiscip. Rev. Forensic Sci. 2020 , 2 , e1372. [ Google Scholar ] [ CrossRef ]
  • Jung, J.W.; Park, S.H.; Lee, S.W. A Tool for Security Requirements Recommendation using Case-Based Problem Domain Ontology. In Proceedings of the 2021 IEEE 29th International Requirements Engineering Conference (RE), Notre Dame, IN, USA, 20–24 September 2021; pp. 438–439. [ Google Scholar ] [ CrossRef ]
  • Shaked, A.; Margalit, O. Sustainable Risk Identification Using Formal Ontologies. Algorithms 2022 , 15 , 316. [ Google Scholar ] [ CrossRef ]
  • Calyam, P.; Kejriwal, M.; Rao, P.; Cheng, J.; Wang, W.; Bai, L.; Siddhardh Nadendla, V.S.; Madria, S.; Das, S.K.; Chadha, R.; et al. Towards a Domain-Agnostic Knowledge Graph-as-a-Service Infrastructure for Active Cyber Defense with Intelligent Agents. In Proceedings of the 2023 IEEE Applied Imagery Pattern Recognition Workshop (AIPR), St. Louis, MO, USA, 27–29 September 2023; pp. 1–8. [ Google Scholar ] [ CrossRef ]
  • Sane, K.; Joshi, K.; Mittal, S. Semantically Rich Framework to Automate Cyber Insurance Services. IEEE Trans. Serv. Comput. 2023 , 16 , 588–599. [ Google Scholar ] [ CrossRef ]
  • Wu, H.; Li, X.; Gao, Y. An Effective Approach of Named Entity Recognition for Cyber Threat Intelligence. In Proceedings of the 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chongqing, China, 12–14 June 2020; pp. 1370–1374. [ Google Scholar ] [ CrossRef ]
  • Gao, P.; Liu, X.; Choi, E.; Soman, B.; Mishra, C.; Farris, K.; Song, D. A System for Automated Open-Source Threat Intelligence Gathering and Management. In Proceedings of the 2021 International Conference on Management of Data, Virtual, 20–25 June 2021; pp. 2716–2720. [ Google Scholar ] [ CrossRef ]
  • Sarhan, I.; Spruit, M. Open-CyKG: An Open Cyber Threat Intelligence Knowledge Graph. Knowl.-Based Syst. 2021 , 233 , 107524. [ Google Scholar ] [ CrossRef ]
  • Li, Z.; Li, Y.; Zhang, H.; Li, J. Construction of TTPS from APT Reports Using Bert. In Proceedings of the 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, China, 17–19 December 2021; pp. 260–263. [ Google Scholar ] [ CrossRef ]
  • Devlin, J.; Chang, M.W.; Lee, K.; Toutanova, K. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proceedings of the North American Chapter of the Association for Computational Linguistics, Mineapolis, MN, USA, 3–5 June 2019. [ Google Scholar ]
  • Sun, L.; Li, Z.; Xie, L.; Ye, M.; Chen, B. APTKG: Constructing Threat Intelligence Knowledge Graph from Open-Source APT Reports Based on Deep Learning. In Proceedings of the 2022 5th International Conference on Data Science and Information Technology (DSIT), Shanghai, China, 22–24 July 2022; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Manning, C.D.; Surdeanu, M.; Bauer, J.; Finkel, J.R.; Bethard, S.; McClosky, D. The Stanford CoreNLP natural language processing toolkit. In Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics: System Demonstrations, Baltimore, MD, USA, 23–25 June 2014; pp. 55–60. [ Google Scholar ]
  • Li, Z.; Li, Y.; Liu, Y.; Liu, C.; Zhou, N. K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph. Symmetry 2023 , 15 , 337. [ Google Scholar ] [ CrossRef ]
  • kbandla/APTnotes: Various Public Documents, Whitepapers and Articles about APT Campaigns. Available online: https://github.com/aptnotes/data (accessed on 16 May 2024).
  • Husari, G.; Niu, X.; Chu, B.; Al-Shaer, E. Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence. In Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), Miami, FL, USA, 9–11 November 2018; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Liu, J.; Zhan, J. Constructing Knowledge Graph from Cyber Threat Intelligence Using Large Language Model. In Proceedings of the 2023 IEEE International Conference on Big Data (BigData), Sorrento, Italy, 15–18 December 2023; pp. 516–521. [ Google Scholar ] [ CrossRef ]
  • Huguet Cabot, P.L.; Navigli, R. REBEL: Relation Extraction By End-to-end Language generation. In Findings of the Association for Computational Linguistics: EMNLP 2021 ; Moens, M.F., Huang, X., Specia, L., Yih, S.W.T., Eds.; Association for Computational Linguistics: Punta Cana, Dominican Republic, 2021; pp. 2370–2381. [ Google Scholar ] [ CrossRef ]
  • Ren, Y.; Xiao, Y.; Zhou, Y.; Zhang, Z.; Tian, Z. CSKG4APT: A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organization Attribution. IEEE Trans. Knowl. Data Eng. 2023 , 35 , 5695–5709. [ Google Scholar ] [ CrossRef ]
  • Dhungana, S.; Upadhyaya, P. Optimal Cyber Threat Intelligent System for Nepal. In Proceedings of the 2019 Artificial Intelligence for Transforming Business and Society (AITB), Kathmandu, Nepal, 5 November 2019. [ Google Scholar ] [ CrossRef ]
  • Elitzur, A.; Puzis, R.; Zilberman, P. Attack hypothesis generation. In Proceedings of the 2019 European Intelligence and Security Informatics Conference (EISIC), Oulu, Finland, 26–27 November 2019; pp. 40–47. [ Google Scholar ] [ CrossRef ]
  • Pingle, A.; Piplai, A.; Mittal, S.; Joshi, A.; Holt, J.; Zak, R. Relext: Relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. In Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Vancouver, BC, USA, 27–30 August 2019; pp. 879–886. [ Google Scholar ] [ CrossRef ]
  • Mendsaikhan, O.; Hasegawa, H.; Yamaguchi, Y.; Shimada, H. Quantifying the significance and relevance of cyber-security text through textual similarity and cyber-security knowledge graph. IEEE Access 2020 , 8 , 177041–177052. [ Google Scholar ] [ CrossRef ]
  • Lim, S.K.; Muis, A.O.; Lu, W.; Ong, C.H. MalwareTextDB: A Database for Annotated Malware Articles. In Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Vancouver, BC, Canada, 30 July–4 August 2017; Barzilay, R., Kan, M.Y., Eds.; Association for Computational Linguistics: Vancouver, BC, Canada, 2017; pp. 1557–1567. [ Google Scholar ] [ CrossRef ]
  • Ding, Z.; Cao, D.; Liu, L.; Yu, D.; Ma, H.; Wang, F. A Method for Discovering Hidden Patterns of Cybersecurity Knowledge Based on Hierarchical Clustering. In Proceedings of the 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC), Shenzhen, China, 9–11 October 2021; pp. 334–338. [ Google Scholar ] [ CrossRef ]
  • Kriaa, S.; Chaabane, Y. SecKG: Leveraging attack detection and prediction using knowledge graphs. In Proceedings of the 2021 12th International Conference on Information and Communication Systems (ICICS), Valencia, Spain, 24–26 May 2021; pp. 112–119. [ Google Scholar ] [ CrossRef ]
  • Mitra, S.; Piplai, A.; Mittal, S.; Joshi, A. Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs. In Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), Orlando, FL, USA, 15–18 December 2021; pp. 3316–3323. [ Google Scholar ] [ CrossRef ]
  • Ranade, P.; Piplai, A.; Mittal, S.; Joshi, A.; Finin, T. Generating Fake Cyber Threat Intelligence Using Transformer-Based Models. In Proceedings of the 2021 International Joint Conference on Neural Networks (IJCNN), Shenzhen, China, 18–22 July 2021. [ Google Scholar ] [ CrossRef ]
  • Yeboah-Ofori, A.; Ismail, U.; Swidurski, T.; Opoku-Boateng, F. Cyber Threat Ontology and Adversarial Machine Learning Attacks: Analysis and Prediction Perturbance. In Proceedings of the 2021 International Conference on Computing, Computational Modelling and Applications (ICCMA), Brest, France, 14–16 July 2021; pp. 71–77. [ Google Scholar ] [ CrossRef ]
  • Yeboah-Ofori, A.; Mouratidis, H.; Ismai, U.; Islam, S.; Papastergiou, S. Cyber Supply Chain Threat Analysis and Prediction Using Machine Learning and Ontology. In Proceedings of the 17th IFIP WG 12.5 International Conference, AIAI 2021, Hersonissos, Greece, 25–27 June 2021; Volume 627, pp. 518–530. [ Google Scholar ] [ CrossRef ]
  • Wang, X.; Chen, R.; Song, B.; An, J.; Jiang, J.; Wang, J.; Yang, P. Learning Cyber Threat Intelligence Knowledge Graph Embedding with Heterogeneous Relation Networks Based on Multi-Head Relational Graph Attention. In Proceedings of the 2022 IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable Computing & Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous & Trusted Vehicles (SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta), Haikou, China, 15–18 December 2022; pp. 1796–1803. [ Google Scholar ] [ CrossRef ]
  • Wang, Y.; Lang, B.; Xiao, N.; Chen, Y. Cyber Threat Indicators Association Prediction Based on Weighted Fusion of Semantic and Topological Information. In Proceedings of the 2022 5th International Conference on Algorithms, Computing and Artificial Intelligence, Sanya, China, 23–25 December 2022. [ Google Scholar ] [ CrossRef ]
  • Piplai, A.; Joshi, A.; Finin, T. Offline RL+CKG: A hybrid AI model for cybersecurity tasks. In Proceedings of the AAAI 2023 Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering (AAAI-MAKE 2023), San Francisco, CA, USA, 27–29 March 2023; Volume 3433. [ Google Scholar ]
  • Zhang, S.; Li, S.; Chen, P.; Wang, S.; Zhao, C. Generating Network Security Defense Strategy Based on Cyber Threat Intelligence Knowledge Graph. In Proceedings of the First International Conference, ICENAT 2022, Shenzhen, China, 15–17 November 2023; Volume 1696, pp. 507–519. [ Google Scholar ] [ CrossRef ]
  • Zhang, Y.; Chen, J.; Cheng, Z.; Shen, X.; Qin, J.; Han, Y.; Lu, Y. Edge propagation for link prediction in requirement-cyber threat intelligence knowledge graph. Inf. Sci. 2024 , 653 , 119770. [ Google Scholar ] [ CrossRef ]
  • Liu, C.; Wang, B.; Wang, Z.; Tian, J.; Luo, P.; Yang, Y. TCFLTformer: TextCNN-Flat-Lattice Transformer for Entity Recognition of Air Traffic Management Cyber Threat Knowledge Graphs. Aerospace 2023 , 10 , 697. [ Google Scholar ] [ CrossRef ]
  • Kaiser, F.K.; Dardik, U.; Elitzur, A.; Zilberman, P.; Daniel, N.; Wiens, M.; Schultmann, F.; Elovici, Y.; Puzis, R. Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph. IEEE Trans. Dependable Secur. Comput. 2023 , 20 , 4793–4809. [ Google Scholar ] [ CrossRef ]

Click here to enlarge figure

ReferenceYear PublishedBrief SummaryDomain
 [ ]2013Proposed the use of Semantic Web and Ontology concepts to define an approach for analyzing security logs for security issues identification.Web Attacks
 [ ]2013Introduced S-MAIDS, a semantic approach to IDRS modeling using OWL ontologies.IDRS
 [ ]2014Proposed a taxonomy for the classification of existing CTI sharing technologies.CTI
 [ ]2015Proposed the DFAX ontology for representing and exchanging digital information.Digital forensic information
 [ ]2015Presented an ontology for the enhancement of cyber defense against APTs.APT
 [ ]2016Proposed an ontology for the efficient organization of OSINT and threat indicators.CTI
 [ ]2017Proposed an ontology-based framework for the IoT environment to safeguard against APTs.APT in IoT Environments
 [ ]2017Defined an ontology for threat analytics.CTI
 [ ]2018Presented a CTI ontology for the analysis and classification of Sysmon logs.CTI
 [ ]2019Proposed an approach of analyzing real-time network log data within a NSM environment by using a graph database.NSM
 [ ]2019Proposed an ontology of metrics for security management.Cybersecurity Management
 [ ]2019Proposed an ontology knowledge base that can define APT attack patterns and recommend security requirements.APT
ReferenceYear PublishedBrief SummaryDomain
 [ ]2020Proposed a STIX-based network security KG ontology modeling method for the analysis of the concepts of network security knowledge.Network Security
 [ ]2020Proposed an enriched cybersecurity KG by merging information about malware behavior data.CTI
 [ ]2020Proposed MALOnt, an ontology for malware threat intelligence.Malware Threat Intelligence
 [ ]2020Constructed a KG that stores CTI regarding various medical devices.Vulnerabilities of Medical Devices in IoT
 [ ]2021Proposed an ontology for XSS attacks.XSS Attacks
 [ ]2021Proposed an ontology-based framework with logical inference for the detection of cyber attacks.Cyber Attacks and Incidents
 [ ]2021Presented an ontological approach for the automatic inference of threat actor types based on a standardized set of attributes.Threat Actor
 [ ]2021Proposed a STIX-based ontological reasoning approach for potential cyber threatsCTI
 [ ]2021Constructed an ontology for cyber risk monitoringCyber Risk Monitoring
ReferenceYear PublishedBrief SummaryDomain
 [ ]2022Proposed a cloud-native ontology capable of connecting security-related data from different cloud sources to enhance CTI.Cloud-native cyber incident response
 [ ]2022Proposed a CTI ontology that enables the automation and analysis of the available threat intelligence.CTI
 [ ]2022Developed a generic ontology for the representation of IoT objects to encapsulate vulnerabilities, attack attribution, impact evaluation and mitigation strategies within a smart home environment.Risk Assessment in IoT Environments
 [ ]2022Proposed an ontology for risk assessment modeling.Security Risk Information
 [ ]2022Proposed an ontology and an automated information extraction method, capable of integrating the parsed information from CTI reports into each instance.CTI
 [ ]2022Proposed AttackKG, a KG used for the automated extraction of attack behavior graphs from CTI reports.CTI
 [ ]2022Proposed TINKER, a framework that utilizes ontologies and KGs for capturing cyber threat information.CTI
 [ ]2022Supported the use of graph databases for near real time network log monitoring.Network Log Files
 [ ]2022Presented a KG based on kernel audit logs for the efficient organization of big data, enabling querying during threat hunting activities.Cyber Threat Hunting
ReferenceYear PublishedBrief SummaryDomain
 [ ]2023Constructed a Unified Ontology encompassing APT techniques, weaknesses, vulnerabilities, and defense countermeasures.APT
 [ ]2023Presented a security ontology for cloud, edge and on-premises environments and used it to determine the most appropriate security mechanisms.CTI
 [ ]2023Proposed OBSQL, an ontology for detecting blind SQL weaknesses.Blind SQL Injection
 [ ]2023Defined an ontology for the description of different types of anomalies and proposed an approach that merges the ontology with previously developed models for CTI.Risk Management
 [ ]2023Proposed an event-based threat intelligence ontology for threat detection and response scenarios.CTI
 [ ]2023Introduced the ADACO model, constructed by integrating data from multiple cybersecurity databases.CTI
ReferenceYear PublishedBrief SummaryTools
 [ ]2014Proposed an RDF metadata generation mechanism for cybersecurity information management.RDF metadata generation
 [ ]2015Developed a reasoning mechanism for query execution when addressing different cyber situations.Reasoning, querying
 [ ]2016Explored the overlap between different information exchange standards using ontologies and library science techniques.Library science methods
 [ ]2016Proposed “net vulnerability”, a metric for measuring security risks of networked systems.Novel metric
 [ ]2017Leveraged an ontology to gain knowledge about an IoT environment.OWL
 [ ]2018Presented a novel description logic-based formalism to model fuzzy and uncertain cyber-related information.Fuzzy logic
 [ ]2019Demonstrated the efficiency of semantic technology within CTI use cases by using the STIX representation and the Maltego tool.Semantics
 [ ]2019Introduced a SIEM-based KG and MalRank, a graph-based inference algorithm for maliciousness score estimation.Graph inference algorithm
 [ ]2019Developed a model relying on ontologies to enhance the risk management capabilities of organizations.OWL, Reasoning
 [ ]2020Developed an ontology-driven CFRaaS model for digital evidence gathering.Description logic
 [ ]2021Proposed an APT attacks recommendation tool for attack scenario analysis and inference.Similarity measures
 [ ]2022Proposed OnToRisk, an ontology-driven risk management analysis method.Protege, OWL
 [ ]2023Proposed the KGaaS framework for the generation and maintenance of domain-specific KGs.Cypher, Natural Language, RDF
 [ ]2023Developed a novel framework for cyber insurance policy suggestion.RDF, SPARQL, IR, AI
ReferenceYear PublishedBrief SummaryTechnology UsedEvaluation Scores
[ ]2017Introduced TTPDrill, a tool that automates threat action knowledge extraction from unstructured reports.NLP, IRPrecision
Recall
[ ]2020Created a knowledge extraction pipeline from AARs to fill a cybersecurity KG.CRF, Gibbs’ sampling, RelExtPrecision
Recall
F1-score
[ ]2020Proposed a model for enhancing NER.BiLSTM, CRFF1-score
[ ]2021Proposed SECURITYKG, a system for automating the processing of open-source CTI.NLP-
[ ]2021Created Open-CyKG for presenting APT reports as a queryable KG.BiGRU, CRF, XLM-RoBERTaDataset: Microsoft (CTI)
Recall  
Precision  
F1-score  
[ ]2021Used a DL model for knowledge extraction and constructed a cyber threat ontology.BERT, BiLSTM, CRFRecall
Accuracy
[ ]2022Proposed a CTI extraction system using DL models and constructed a KG.BERT, BiLSTM, CNNEntity extraction
Precision
Recall
F1-score
Accuracy
Coreference resolution
Precision
Recall
F1-score
Relation extraction
Precision
Recall
F1-score
 [ ]2022Proposed APTKG, a framework that constructs automatically KGs from open-source APT reports.BiLSTM, CRF, BERT, CNN, Stanford CoreNLPF1-score
 [ ]2023Proposed K-CTIAA to automate CTI analysis with pre-trained models and KGs.Pre-trained modelsPrecision
Recall
F1-score
 [ ]2023Leveraged LLMs to build a CTI KG.LLM, ChatGPTEntity recognition (Relation extraction)
Precision
Recall
F1-score
 [ ]2023Created CSKG4APT for the organization of APT knowledge from bilingual documents.BERTEnglish Macro (Micro)
Precision
Recall
F1-score
ReferenceYear PublishedBrief SummaryTechnology UsedEvaluation Scores
 [ ]2019Used ML and DL methods with ontology mapping to address the cyber-related issues in Nepal.RF, DLRF (DL)
Accuracy
Precision
Recall
 [ ]2019Proposed AHG, which applies link prediction techniques on CTI-derived KGs.Link prediction, collaborative filteringAlgorithm Precision
SupLP:
CF( ):
LPPorjD:
CF( ):
 [ ]2019Introduced the RelExt system for predicting relationships between cybersecurity entities.FFNNAccuracy
 [ ]2020Proposed a novel ML- and DL-based mechanism for evaluating quantitatively the relevance of cybersecurity text data.USE, CRFClassifier, Logistic RegressionAccuracy
 [ ]2021Used hierarchical clustering techniques to unveil hidden patterns in the MITRE KG.Hierarchical clustering-
 [ ]2021Created the SecKG schema, generated a KG and applied a KGCN for attack prediction.KGCN-
 [ ]2021Associated provenance with the entities and relations of a cybersecurity KG to ensure the authenticity of the data.NLP-
 [ ]2021Leveraged transformer-based models to produce fake CTI data and poison a cybersecurity KG and corpus.Transformers, GPT-2-
ReferenceYear PublishedBrief SummaryTechnology UsedEvaluation Scores
 [ ]2021Modelled APT attacks as an ontology and used supervised AML methods to deceive classifiers during training and testing.AMLRF (GBoost)
Before adversarial attacks: Accuracy
After adversarial attacks: Accuracy
 [ ]2021Combined cyber supply chain security ontology concepts and ML for threat analysis and prediction.RF, GBoostAccuracy =
 [ ]2022Proposed a GNN to learn KG embeddings and constructed a dataset from APT reports.GNNEntity Classification (Link Prediction)
MR = 201 (223)
MRR = 0.316 (0.345)
Hits@1 = 0.232 (0.267)
Hits@3 = 0.369 (0.394)
Hits@10 = 0.607 (0.625)
 [ ]2022Proposed a Ctiap model that fuses semantic and topological features of a KG to predict relations.Link prediction, NNAccuracy
Macro F1-score
 [ ]2023Examined the guidance of RL algorithms with KGs.RL, CQLHits@10 for different malware families
 [ ]2023Proposed a CTI ontology and KG schema and used link prediction methods to infer new knowledge.Link prediction-
 [ ]2024Proposed EGNN for edge information propagation and applied link prediction on a constructed KG.GNNDataset: FB15K-237, WN18RR, RCTI, WN18
hit@10: , , ,
hit@3: , , ,
hit@1: , , ,
MR: 168, 2828, 3822, 250
MRR: , , ,
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Bratsas, C.; Anastasiadis, E.K.; Angelidis, A.K.; Ioannidis, L.; Kotsakis, R.; Ougiaroglou, S. Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review. J. Cybersecur. Priv. 2024 , 4 , 518-545. https://doi.org/10.3390/jcp4030025

Bratsas C, Anastasiadis EK, Angelidis AK, Ioannidis L, Kotsakis R, Ougiaroglou S. Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review. Journal of Cybersecurity and Privacy . 2024; 4(3):518-545. https://doi.org/10.3390/jcp4030025

Bratsas, Charalampos, Efstathios Konstantinos Anastasiadis, Alexandros K. Angelidis, Lazaros Ioannidis, Rigas Kotsakis, and Stefanos Ougiaroglou. 2024. "Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review" Journal of Cybersecurity and Privacy 4, no. 3: 518-545. https://doi.org/10.3390/jcp4030025

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

Karnataka Now Has A New Cyber Security Policy. Here Are The Highlights

The policy focuses on several key areas such as awareness and education, skill building, promotion of industry and startups, partnerships and collaborations for capacity building, officials said.

Karnataka Now Has A New Cyber Security Policy. Here Are The Highlights

Karnataka Government today launched a comprehensive cyber security policy 2024.

The Karnataka Government today launched a comprehensive cyber security policy 2024 to combat rising levels of cyber-crimes and promote awareness, skill building, public-private partnerships and technology integration to protect the state's digital infrastructure.

"The Government of Karnataka, recognising the rising importance of cyber security, has meticulously crafted this policy to establish a resilient and secure cyberspace for our citizens and enterprises," Minister for Rural Development and Panchayat Raj and Information Technology and Biotechnology, Priyank Kharge, said at the lunch event.

He emphasised that the policy, aligned with national and international efforts, highlights Karnataka's proactive stance in addressing cyber threats.

According to him, the policy has two parts. The first part focuses on building a strong cyber security ecosystem across all segments of the society, including public, academia, industry, start-ups and the government. The second part of the policy focuses on strengthening the cyber security posture of the State's IT assets.

Whilst the first part will be in public domain, the second will be internal to the state's IT teams and departments for their IT implementations.

This policy has been collaboratively drafted by the Department of Electronics, IT, BT and S&T, the department of Personnel and Administrative Reforms (e-Governance), and the Home Department, in consultation with relevant stakeholders from both the government and private sectors.

The policy was also reviewed by the Indian Institute of Science, which is the anchor institute for the state's K-tech Centre of Excellence for Cyber Security (CySecK).

He also launched a skilling programme by network giant CISCO.

Promoted Listen to the latest songs, only on JioSaavn.com

"This partnership with CISCO is a testament to our commitment to fostering a secure digital environment. By training 40,000 individuals, with a special emphasis on empowering women, we are not only addressing the skills gap but also promoting inclusivity in the tech sector," Mr Kharge said.  

(Except for the headline, this story has not been edited by NDTV staff and is published from a syndicated feed.)

How Cyber Thieves Cleaned Out Rs 16.5 Crore From Bank In Noida

Track Budget 2023 and get Latest News Live on NDTV.com.

Track Latest News Live on NDTV.com and get news updates from India and around the world .

India Elections | Read Latest News on Lok Sabha Elections 2024 Live on NDTV.com . Get Election Schedule , information on candidates, in-depth ground reports and more - #ElectionsWithNDTV

Watch Live News:

cyber crime dissertation pdf

Cyber-Crimes and their Impacts: A Review

  • January 2012
  • 2(2):202-209

Hemraj Saini at DIT University

  • DIT University

Yerra Shankar Rao at NIST University

  • NIST University
  • This person is not on ResearchGate, or hasn't claimed this research yet.

Discover the world's research

  • 25+ million members
  • 160+ million publication pages
  • 2.3+ billion citations

Fayaz Ahmad Paul

  • Te Taka Keegan

Atulya Singh

  • Fahad Sameer Alshammari

Syed Raza Shah Gilani

  • Ali Mohammed AlMatrooshi
  • Wafa’a Al-Surkhi
  • Mahmoud Maqableh

Patcha Bhujanga Rao

  • Bharat Lal Tiwari

Krishna Verma

  • Prabhat Pandey

Oluwatoyin Esther Akinbowale

  • Polly Mashigo

Mulatu Fekadu Zerihun

  • Vaishali Panda

Ashutosh Mishra

  • Lawrence A. Gordon

Martin P. Loeb

  • R. Richardson
  • Tashfeen Sohail
  • Richard Power

Jeffrey A. Hoffer

  • J Bus Strat
  • Brian J. Kelly
  • COMPUT SECUR
  • Bill Hancock

Richard Baskerville

  • Dsl Reports
  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

IMAGES

  1. (PDF) Cyber Crimes- Challenges & Solutions

    cyber crime dissertation pdf

  2. Cyber Crime publication.pdf

    cyber crime dissertation pdf

  3. Cyber Crime publication.pdf

    cyber crime dissertation pdf

  4. Jurisdictional Issues in Cyber Crime

    cyber crime dissertation pdf

  5. (PDF) A Comparative Study on Cyber Crime, Security, and Law

    cyber crime dissertation pdf

  6. (PDF) Legal Protection for Cyber Crime Victims on Victimological

    cyber crime dissertation pdf

VIDEO

  1. Introduction to Cyber Crime

  2. CYBERSECURITY AND CYBERTHREATS

  3. Introduction to Cyber Crimes, Emerging Trends and Application of Digital Forensic Fraud Accountant

  4. Degree 6th sem cyber security model papers 202|| cyber security model papers

  5. Essay : Cyber crime and prevention || साइबर अपराध एवं सुरक्षा या रोकथाम ssc cgl ssc mts

  6. Cyber Crime Vs Conventional Crime|Cyber Crimes & Laws|DU

COMMENTS

  1. PDF Dissertation Exploring the Cybercrime Capacity and Capability of Local

    DISSERTATION EXPLORING THE CYBERCRIME CAPACITY AND CAPABILITY OF LOCAL LAW ENFORCEMENT AGENCIES IN THE UNITED STATES Submitted by Christopher Jerome Moloney ... creating new pathways and opportunities for people to commit crimes or engage in harmful behavior via the internet or digitally networked devices. Cybercrime is rapidly

  2. PDF CYBERSECURITY: HOW SAFE ARE WE AS A NATION?

    This thesis will lay out the importance of connectivity in our society - from the individual user to national security and the military. I will examine the vulnerabilities, cite case studies, and look at the consequences the cyberattacks have or could have on society. To best frame my research, I will include recent cyber events and examine the

  3. PDF Cybercrime: an Analysis of Current Legislation in South Africa

    The purpose of this mini-dissertation is to firstly examine the development of the South African law with the focus on cybercrimes; the criminality of cybercrimes and issues pertaining to the definitions as well as to analyse the effectiveness of the current legislation in addressing this type of crime. A secondary aspect of the paper is an ...

  4. (PDF) Cybercrime and Cybercriminals: A Comprehensive Study

    Available online at: www.ijcncs.org. E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Cybercrime and Cybercriminals: A Co mprehensive Study. REGNER SABILLON, JEIMY CANO, VICTOR CAVALLER, JORDI ...

  5. (PDF) Cyber Crime: Rise, Evolution and Prevention

    Abstract. Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most, but not all, cybercrime is committed by cybercriminals or hackers ...

  6. PDF Microsoft Word

    There are endless definitions for cybercrime because there is a variety of aspects. to consider about cybercrime. The components of a cybercrime vary in three ways of 1) In some cybercrimes that computers or data are the targets. 2) Computers or digital. technologies used as tools for committing cybercrimes.

  7. PDF Comprehensive Study on Cybercrime

    cybercrime and encouraged it to enhance its efforts to complete its work and to present the outcome of the study to the Commission on Crime Prevention and Criminal Justice in due course. The first session of the expert group was held in Vienna from 17 to 21 January 2011.

  8. Shodhganga@INFLIBNET: Prevention of Cyber Crimes in India A Comparative

    Adobe PDF: View/Open: 11. cyber crime and its global perspectives corrected.pdf: 536.44 kB: Adobe PDF: View/Open: 12. constitutional and legislative response to cyber crimes.pdf: 1.72 MB: Adobe PDF: View/Open: 13. judicial response to cyber crimes (1).pdf: 480.02 kB: Adobe PDF: View/Open: 14. cyber crime its problem and prevention corrected.pdf ...

  9. PDF Cybercrime and Analysis of Laws: a Case Study of Zanzibar Legal ...

    This dissertation is specially based on the researcher study about the cybercrime and analysis of laws: a case study of Zanzibar legal issues. The data collected through interviews, internet and library research with focus on the issue of cybercrime in Zanzibar ; the data was collected from different institutions called Director of Public

  10. (PDF) Investigating Cybercrime

    crimes in subsections 2.1.1 and 2.1.2. 6 Knowledge about both types of cyber- crime is required, in order to understand how computers and the Internet are used to commit such crimes and how this ...

  11. Shodhganga : a reservoir of Indian theses @ INFLIBNET

    We would like to show you a description here but the site won't allow us.

  12. PDF CYBER SECURITY AS AN EMERGING

    TRODUCTIONThe last chapter will summarise the key findings of this study. This research explored the current cha. lenges within cyber security affecting South Africa's national security. This study provided an assessment on the concepts of national security and cyber security, discussed the evolution of South Afric.

  13. PDF Santa Clara University LLM dissertation

    The first one depicts the criminological aspects of cyber-crime by defining the phenomenon, identifying the different groups of cyber-criminals and analyzing recent statistics and cases to determin the extent of the threat that our society faces. A second chapter focuses on the Council of Europe Convention on Cyber-crime. It begins

  14. Shodhganga@INFLIBNET: Cyber crime and cyber terrorism in India

    The Shodhganga@INFLIBNET Centre provides a platform for research students to deposit their Ph.D. theses and make it available to the entire scholarly community in open access. Shodhganga@INFLIBNET. Aligarh Muslim University. Department of Law.

  15. PDF MastersThesis ChristofferSjöblom AI in Cybersecurity and ...

    Malware is an often-used method in cyber criminality. Malware is malicious software used to accomplish identity theft, cyber espionage, and disruptions in systems. Malware appears in the form of viruses, Trojan horses, and ransomware [24]. In contrast to a typical bug, malware is an attempt designed to cause harm.

  16. Criminology Theses and Dissertations

    Theses/Dissertations from 2013 PDF. Assessing the Relationship Between Hotspots of Lead and Hotspots of Crime, Kimberly L. Barrett. PDF. A Life-Course Approach to Sexual Offending: Examining the Continuity of Juvenile Sexual Offending into Adulthood and Subsequent Patterns of Recidivism, Maude Beaudry-Cyr. PDF

  17. (PDF) A Study of Cyber Crime and Perpetration of Cyber Crime in India

    A total of 549 persons were arrested. in the countr y f or cyber crimes under IPC during. 2012. 47.9% (263) of these offenders were arrested. for offences under 'cyber forg er y', 39.2% (215 ...

  18. A Latent Class Analysis of Online Victim-Offender Overlap among Chinese

    Weulen Kranenbarg et al. (2019) examined a Dutch sample of high-risk adult suspects of cybercrime and traditional crime and found 9.59% victim-offender overlap for cybercrime and 13.73% for traditional crime. They further suggested that correlates like low self-control and routine activities partly explained victim-offender overlap in cybercrime.

  19. Securing Industry 4.0: Assessing Cybersecurity ...

    A Deloitte report on cyber risk in advanced fabrication companies highlighted that 'Increasingly, people are the greatest cybersecurity risk; whether the intent is malicious or not, they are our most significant liability' [63].The reviewed literature consistently emphasises that the workforce's comprehension and involvement in cybersecurity policies are the most crucial elements of a ...

  20. PDF 2023 1internet Crime Report

    2023 5INTERNET CRIME REPORT THE IC3'S ROLE IN COMBATTING CYBER CRIME1 1 Accessibility description: Image lists the I 3's primary functions including partnering with private sector and with local, state, federal, and international agencies: hosting a reporting portal at www.ic3.gov; providing a central hub to

  21. Shodhganga@INFLIBNET: Cyber Crime in Banking Sector the Study of

    Shodhganga. The Shodhganga@INFLIBNET Centre provides a platform for research students to deposit their Ph.D. theses and make it available to the entire scholarly community in open access. Shodhganga@INFLIBNET. Savitribai Phule Pune University.

  22. JCP

    The amount of data related to cyber threats and cyber attack incidents is rapidly increasing. The extracted information can provide security analysts with useful Cyber Threat Intelligence (CTI) to enhance their decision-making. However, because the data sources are heterogeneous, there is a lack of common representation of information, rendering the analysis of CTI complicated. With this work ...

  23. Karnataka Now Has A New Cyber Security Policy. Here Are The Highlights

    Karnataka today launched a comprehensive cyber security policy 2024 to combat rising levels of cyber-crimes and promote awareness, skill building, public-private partnerships and technology ...

  24. (PDF) Cyber-Crimes and their Impacts: A Review

    o In Australia, cybercrime costs businesses more than $600 million a year, while in the US, one in five online. consumers have been vic tims of cybercri me in the last two years, eq uating to $8 ...

  25. Coercive Control in 2SLGBTQQIA+ Relationships: A Scoping Review

    Multiple records by the same authors (e.g., books or dissertations with related journal publications) were initially screened in and cross-checked at the full-text stage for overlapping content; this resulted in two dissertations being excluded due to research questions, data analysis, or reported results overlapping with a subsequent published ...