Conferences related to Cybercrime Detection

Back to Top

2019 International Conference on Computer and Information Sciences (ICCIS)

ICCIS will provide a forum for researchers, scientists and engineers to exchange and share their experiences, and research results about all aspects of computer and information science.

  • 2012 International Conference on Computer & Information Science (ICCIS)

    The primary goal of the conference is to promote research and development activities in Computer Science, Information Technology and Information Sciences. The secondary goal is to promote the exchange of scientific information between researchers, developers, engineers, students, and practitioners from around the world.


IEEE EUROCON 2019 -18th International Conference on Smart Technologies

EUROCON is a flagship event of the IEEE Region 8 (Europe, Middle East and Africa) held every two years in a different country with participants from all over the world. EUROCON is a major international forum for the exchange of ideas, theory basics, design methodologies, techniques and experimental results between academia, research institutions and practitioners from industry. It has achieved a considerable success during the past 17 editions in all fields of electrical and electronic engineering, ICT and computer science covered by IEEE Societies: Aerospace and Electronic Systems; Antennas and Propagation; Broadcast Technology; Circuits and Systems; Communications; Components, Packaging, and Manufacturing Technology; Computational Intelligence; Computer Engineering; Consumer Electronics; Control Systems; Dielectrics and Electrical Insulation; Education; Electron Devices; Electromagnetic Compatibility; Engineering in Medicine and Biology; Geoscience and Remote Sensing;

  • IEEE EUROCON 2017 -17th International Conference on Smart Technologies

    EUROCON is a flagship event of the IEEE Region 8 (Europe, Middle East and Africa) held every two years in a different country with participants from all over the world. EUROCON is a major international forum for the exchange of ideas, theory basics, design methodologies, techniques and experimental results between academia, research institutions and practitioners from industry. It has achieved a considerable success during the past 16 editions in all fields of electrical and electronic engineering, ICT and computer science covered by all IEEE Societies.To achieve its aim the technical program includes plenary sessions (invited plenary lectures), regular technical sessions, special sessions, poster sessions, panel discussions and industry exhibition.The technical sessions are grouped in four tracks:- Information and Communication Technologies,- Circuits, Systems and Signal Processing,- Power Engineering and Energy,- Industrial and Consumer Applications.

  • IEEE EUROCON 2015 - International Conference on Computer as a Tool (EUROCON)

    The IEEE Region 8 EuroCon 2015 Conference is a premier forum for the exchange of ideas, open and direct discussion on the development of the Circuits and Systems, Multimedia, Information and Communication Technology and energy and power systems.

  • IEEE EUROCON 2013

    The IEEE Region 8 EuroCon 2013 Conference is a premier forum for the exchange of ideas, open and direct discussion on the development of the Circuits and Systems, Multimedia, Information and Communication Technology and energy and power systems. It has achieved a considerable success during the past seven editions covering majority of the fields in the area of electrical engineering.

  • IEEE EUROCON 2011 - International Conference on Computer as a Tool (EUROCON)

    Main topics: Telecommunications and Multimedia Systems; Information Technologies and Intelligent Systems; CIRCUITS AND SYSTEMS; POWER SYSTEMS AND RENEWABLE RESOURCES; EDUCATION; ENGINEERING MANAGEMENT To promote interaction between industry and academia contributions of recent industrial developments will be accepted and published in a maximum 1-page of abstract and 1-page of figures.

  • IEEE EUROCON 2009 - International Conference devoted to 150 Anniversary of Alexander Popov

    Antennas, Microwave Technology, Biotechnical Systems, Circuits and Systems, Computer Technology, Power Systems and Renewable Energy, Electrical Machines and Drives, Control Systems, Measurement Technology, Micro and Nano Systems, Telecommunications, Broadcast and Consumer Systems, Signal and Image Processing, Electromagnetic Compatibility, History of Electrical Engineering

  • IEEE EUROCON 2007 - The International Conference on "Computer as a Tool"

  • EUROCON 2005 - The International Conference on "Computer as a Tool"

  • EUROCON 2003

  • EUROCON 2001

  • EUROCOMM 2000


2018 16th Annual Conference on Privacy, Security and Trust (PST)

The annual Privacy, Security and Trust research conference has established itself as a leading forum for the presentation and discussion of the latest challenges and solutions covering a wide range of Privacy, Security, and Trust (PST) topics (http://www.pstnet.ca/pst2018). The PST conference takes a broad approach including examining the issues from both the research and practice perspectives, encouraging multidisciplinary research, and fostering collaboration between academe, the private sector and government. The conference will include an industry day which will be an opportunity for government and industry experts, industry groups, and academics to discuss and exchange knowledge of the state of the art in privacy, security and trust and the issues facing the industry, with a particular focus on those regarding cyber security.PST2018 consists of 3 themes (Privacy, Security, Trust). Members of the TCSP have interests in at least one of the 3 themes.

  • 2017 15th Annual Conference on Privacy, Security and Trust (PST)

    PST2017 covers a wide range of Privacy, Security, and Trust (PST) topics. The topics are inter-disciplinary across privacy, security and trust. Technologies of interest include:Access ControlAdversarial Machine LearningAnonymity, Accountability and AuditAttacks on Security and PrivacyAuthenticationBiometricsBlockchain and Related TechnologiesComputer and Network ForensicsCryptographic ProtocolsDistributed Trust and ConsensusFormal Methods for Security and PrivacyIdentity ManagementIntrusion DetectionKey ManagementMetrics for Security and PrivacyPrivacy Preserving/Enhancing TechnologiesProgram Analysis for Security and PrivacyQuantum-resistant CryptographyReputation SystemsThreat modeling and risk analysis The PST conference is unique in its broad approach including examining the issues from both the research and practice perspectives, encouraging multidisciplinary research, and fostering collaboration between academe, the private sector and government.

  • 2016 14th Annual Conference on Privacy, Security and Trust (PST)

    PST2016 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation. Privacy concerns the operational policies, procedures and regulations implemented within an information system to control for the unauthorized use of, access to, or release of personal information held in any format. Security addresses the various components of an information system that safeguard the data and associated infrastructure from unauthorized activity. Trust is a fundamental human behaviour. It is necessary for people to function in social groups, and it forms the foundation for many of our organizations and relationships.

  • 2015 13th Annual Conference on Privacy, Security and Trust (PST)

    PST2015 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation. Privacy concerns the operational policies, procedures and regulations implemented within an information system to control for the unauthorized use of, access to, or release of personal information held in any format. Security addresses the various components of an information system that safeguard the data and associated infrastructure from unauthorized activity. Trust is a fundamental human behavior. It is necessary for people to function in social groups, and it forms the foundation for many of our organizations and relationships.

  • 2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)

    The PST conference mission is to provide a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation.

  • 2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)

    Today new technologies and new applications will not be widely adopted until it can be demonstrated that the security of the underlying ICT infrastructure and the privacy of information being processed are both protected. Only then will users trust and therefore use these innovations and then, and only then, will the developers and society as a whole reap the benefits of the innovation. Without breakthroughs in Privacy, Security and Trust (PST) technology the "bad guys" will continue to thwart our best efforts to convince the public that cyber space is a safe place to do business. The annual Privacy, Security and Trust research conference has quickly established itself as a leading forum for the presentation and discussion of the latest challenges and solutions covering a wide range of PST topics. The PST conference is unique in its broad approach including examining the issues from both the research and practiceperspectives, encouraging multidisciplinary research, and fosterin

  • 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST)

    PST2011 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation. PST2011 will include an Innovation Day featuring workshops and tutorials followed by two days of high-quality research papers.

  • 2010 Eighth Annual International Conference on Privacy, Security and Trust (PST)

    PST2010 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation.

  • 2008 6th Annual Privacy, Security and Trust Research Conference (PST2008)

    The PST conference is unique in its broad approach to privacy, security and trust research including examining the issues from both the research and practice perspectives, encouraging multidisciplinary research, and fostering collaboration between academe, the private sector and government.


2018 APWG Symposium on Electronic Crime Research (eCrime)

eCrime consist of two full days which bring together academic researchers, security practitioners, and law enforcement to discuss all aspects of electronic crime and ways to combat it


2018 European Intelligence and Security Informatics Conference (EISIC)

Intelligence and Security Informatics (ISI) is an interdisciplinary field of research that focuses onthe development, use, and evaluation of advanced information technologies, includingmethodologies, models and algorithms, systems, and tools, for local, national, and internationalsecurity related applications.

  • 2017 European Intelligence and Security Informatics Conference (EISIC)

    Intelligence and Security Informatics (ISI) is an interdisciplinary field of research that focuses onthe development, use, and evaluation of advanced information technologies, includingmethodologies, models and algorithms, systems, and tools, for local, national, and internationalsecurity related applications.

  • 2016 European Intelligence and Security Informatics Conference (EISIC)

    Intelligence and Security Informatics (ISI) is an interdisciplinary field of research that focuses on the development, use, and evaluation of advanced information technologies, including methodologies, models and algorithms, systems, and tools, for local, national, and international security related applications.

  • 2015 European Intelligence and Security Informatics Conference (EISIC)

    Intelligence and Security Informatics (ISI) is an interdisciplinary field of research that focuses on the development, use, and evaluation of advanced information technologies, including methodologies, models and algorithms, systems, and tools, for local, national, and international security related applications.

  • 2013 European Intelligence and Security Informatics Conference (EISIC)

    Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts.

  • 2012 European Intelligence and Security Informatics Conference (EISIC)

    We invite academic researchers (in information technologies, computer science, public policy, and social and behavioral studies), law enforcement and intelligence experts, as well as information technology companies, industry consultants and practitioners in the fields involved.

  • 2011 European Intelligence and Security Informatics Conference (EISIC)

    Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, and prevention.


More Conferences

Periodicals related to Cybercrime Detection

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


IT Professional

This IEEE Computer Society periodical covers the many rapidly emerging issues facing information technology professionals, developers, and managers of enterprise information systems. IT Professional's coverage areas include: Web services, Internet security, data management; enterprise architectures and infrastructures; organizing and utilizing data; instituting cross-functional systems; using IT for competitive breakthroughs; integrating systems and capitalizing on IT advances; emerging technologies like electronic ...


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...



Most published Xplore authors for Cybercrime Detection

Back to Top

Xplore Articles related to Cybercrime Detection

Back to Top

A framework to detect cybercrime in the virtual environment

2012 International Conference on Computer & Information Science (ICCIS), 2012

A wide gap in knowledge currently exists as to what constitutes Cybercrime money laundering and terrorism financing behaviour - in the virtual environments. Until now, no detailed behaviour maps, rule bases or models have been designed which describe and validate what money laundering and terrorism financing in virtual environments might look like if they were to occur. Besides that, no ...


An Approach to Detect and Prevent Cybercrime in Large Complex Networks

2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2018

Recently, the Danish defense department announced that research institutions are prominent targets for cybercrime. To better protect these organizations, an approach to prevent and detect cybercrime in large complex computer networks is needed. This paper contributes by a proof of concept of such an approach, based on a combination of Penetration test (Pen test) and Domain Name System (DNS) analysis. ...


Fusion of ANN and SVM classifiers for network attack detection

2017 18th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), 2017

With the progressive increase of network application and electronic devices (computer, mobile phones, android, etc), attack and intrusion detection is becoming a very challenging task in cybercrime detection area. In this context, most of existing approaches of attack detection rely mainly on a finite set of attacks. However, these solutions are vulnerable, that is, they fail in detecting some attacks ...


Crime data mining: a general framework and some examples

Computer, 2004

A major challenge facing all law-enforcement and intelligence-gathering organizations is accurately and efficiently analyzing the growing volumes of crime data. Detecting cybercrime can likewise be difficult because busy network traffic and frequent online transactions generate large amounts of data, only a small portion of which relates to illegal activities. Data mining is a powerful tool that enables criminal investigators who ...


Evidence theory data fusion-based method for cyber-attack detection

2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 2018

Detecting electronic crimes is a big challenge as they are tainted with a large number of imperfections such as imprecision and uncertainty. For this reason, we must choose a perfect tool to detect cybercrime taking place in an uncertain environment. In this paper, we are proposing a high-level data fusion approach based on evidence theory (Dempster-Shafer theory) which aims at ...


More Xplore Articles

Educational Resources on Cybercrime Detection

Back to Top

IEEE.tv Videos

Working Group Reports - ETAP Forum Namibia, Africa 2017
An FPGA-Quantum Annealer Hybrid System for Wide-Band RF Detection - IEEE Rebooting Computing 2017
Multi-Function VCO Chip for Materials Sensing and More - Jens Reinstaedt - RFIC Showcase 2018
Panel Q&A - ETAP Forum Namibia, Africa 2017
ISEC 2013 Special Gordon Donaldson Session: Remembering Gordon Donaldson - 5 of 7 - SQUID Instrumentation for Early Cancer Diagnostics
Implantable, Insertable and Wearable Micro-optical Devices for Early Detection of Cancer - Plenary Speaker, Christopher Contag - IPC 2018
Critical use cases for video capturing systems in autonomous driving applications
IROS TV 2019- Cutting Edge Forum:Autonomous Driving,Contributions from Intelligent Robotics,AI & ITS
Multiple Sensor Fault Detection and Isolation in Complex Distributed Dynamical Systems
Developing Automated Analysis Tools for Space/Time Sidechannel Detection - IEEE SecDev 2016
IEEE Medal for Environmental and Safety Technologies - Jerome Faist and Frank K. Tittell - 2018 IEEE Honors Ceremony
Cyber Security: Why It’s Everyone’s Business - Panel at IEEE WIE Forum USA East 2017
Parry Aftab of Cybersafety India at Internet Inclusion: Advancing Solutions, Delhi, 2016
An IEEE IPC Special Session with X. Chen from Nokia Bell Labs
Noise Enhanced Information Systems: Denoising Noisy Signals with Noise
Hardware Detection in Implantable Media Devices Using Adiabatic Computing - S. Dinesh Kumar - ICRC 2018
ASC-2014 SQUIDs 50th Anniversary: 4 of 6 - Keiji Enpuku
ETAP Forum Wrap-Up: Maike Luiken - ETAP Forum Namibia, Africa 2017
Low Power Image Recognition: The Challenge Continues
A Recurrent Crossbar of Memristive Nanodevices Implements Online Novelty Detection - Christopher Bennett: 2016 International Conference on Rebooting Computing

IEEE-USA E-Books

  • A framework to detect cybercrime in the virtual environment

    A wide gap in knowledge currently exists as to what constitutes Cybercrime money laundering and terrorism financing behaviour - in the virtual environments. Until now, no detailed behaviour maps, rule bases or models have been designed which describe and validate what money laundering and terrorism financing in virtual environments might look like if they were to occur. Besides that, no effective software tools are exist to systematically detect money laundering and terrorism financing in virtual environments. This paper demonstrates the need for suitable approaches, tools and techniques which can be used to detect money laundering and terrorism financing in virtual environments and introduces a framework which aims to establish a comprehensive set of behaviour maps, rule bases and models to help in the fight against organised cybercrime.

  • An Approach to Detect and Prevent Cybercrime in Large Complex Networks

    Recently, the Danish defense department announced that research institutions are prominent targets for cybercrime. To better protect these organizations, an approach to prevent and detect cybercrime in large complex computer networks is needed. This paper contributes by a proof of concept of such an approach, based on a combination of Penetration test (Pen test) and Domain Name System (DNS) analysis. Pen test is a method to assess a network's current security state, by detecting vulnerabilities and misconfigurations before they are being abused. On the other hand, DNS traffic analysis can be used to detect ongoing cybercriminal/suspicious activities. The combination of the Pen test and DNS analysis can give an administrator a crucial overview of the vulnerabilities present in the system as well as already compromised parts. The methods were tested on the network of Aalborg University, and they were both able to identify ongoing cybercrime or vulnerabilities. While the feasibility was demonstrated, further developments are needed before it can be implemented on a larger scale.

  • Fusion of ANN and SVM classifiers for network attack detection

    With the progressive increase of network application and electronic devices (computer, mobile phones, android, etc), attack and intrusion detection is becoming a very challenging task in cybercrime detection area. In this context, most of existing approaches of attack detection rely mainly on a finite set of attacks. However, these solutions are vulnerable, that is, they fail in detecting some attacks when sources of informations are ambiguous or imperfect. But, few approaches started investigating toward this direction. Following this trends, this paper investigates the role of machine learning approach (ANN, SVM)in detecting TCP connection traffic as normal or suspicious one. But, using ANN and SVM is an expensive technique individually. In this paper, combining two classifiers has been proposed, where artificial neural network (ANN) classifier and support vector machine (SVM) were employed. Additionally, our proposed solution allows to visualize obtained classification results. Accuracy of the proposed solution has been compared with other classifier results. Experiments have been conducted with different network connection selected from NSL-KDD DARPA dataset. Empirical results show that combining ANN and SVM techniques for attack detection is a promising direction.

  • Crime data mining: a general framework and some examples

    A major challenge facing all law-enforcement and intelligence-gathering organizations is accurately and efficiently analyzing the growing volumes of crime data. Detecting cybercrime can likewise be difficult because busy network traffic and frequent online transactions generate large amounts of data, only a small portion of which relates to illegal activities. Data mining is a powerful tool that enables criminal investigators who may lack extensive training as data analysts to explore large databases quickly and efficiently. We present a general framework for crime data mining that draws on experience gained with the Coplink project, which researchers at the University of Arizona have been conducting in collaboration with the Tucson and Phoenix police departments since 1997.

  • Evidence theory data fusion-based method for cyber-attack detection

    Detecting electronic crimes is a big challenge as they are tainted with a large number of imperfections such as imprecision and uncertainty. For this reason, we must choose a perfect tool to detect cybercrime taking place in an uncertain environment. In this paper, we are proposing a high-level data fusion approach based on evidence theory (Dempster-Shafer theory) which aims at improving the reliability of cybercrimes detection process using a more improved decision consisting in merging complementary decisions from two independent classifiers, namely Support Vector Machine (SVM) and Artificial Neural network (ANN) in an uncertain environment. In fact, the retained approach is characterized by its capability to overcome the uncertain data nature.

  • [Front cover]

    The following topics are dealt with: cybercrime properties; cybercrime criminals; international legislation; international laws; agreements; sanctions; digital forensics documentation; digital forensics handling; digital forensics collection; cybercrime detection; anticybercrime; information security; terrorism; electronic transactions; and public awareness.



Standards related to Cybercrime Detection

Back to Top

No standards are currently tagged "Cybercrime Detection"


Jobs related to Cybercrime Detection

Back to Top