Abstract – An ontological model, such as the one proposed in this paper, can provide the basis for many activities. The first important activity is the ability to gather and categorize statistics which provide the empirical basis to discuss deviant computer usage, thus helping to dispel stereotypes. The information gathered via the proposed ontological model could be used to (1) validate or create categories in taxonomies, (2) educate potential victims about their risk factors, (3) help corporations determine security priorities, (4) reduce the potential suspect pool in a crime investigation, (5) provide data for policy makers, (6) create computer crime profiles, and multiple other uses. Index terms – Hacker, Computer, Deviant, Ontology 1
Abstract: Different types of ontologies and knowledge or metaknowledge connected to them are consid...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
The prediction of attacks is essential for the prevention of potential risk. Therefore, risk forecas...
The ubiquity of Internet-connected devices motivates attackers to create malicious programs (malware...
Cybercrime tackling is a major challenge for Law Enforcement Agencies (LEAs). Traditional digital fo...
Malware investigation is a major issue in fighting cybercrime. Because most of the research in this ...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Abstract. We state the benefits of transitioning from taxonomies to ontologies and ontology specific...
Exponential rise of Internet increases the risk of cyber attack related incidents which are generall...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
The structure and basic principles of technology for increasing the probability of identifying subj...
dence from multiple different sources, a short-age of skilled cybercrime agents and inefficient data...
This work introduces an ontological approach for investigating computer involved cases. After explai...
The expansion of technology connectivity and the pervasiveness of data in our society pose both chal...
Ontologies have developed into a prevailing technique for establishing semantic interoperability amo...
Abstract: Different types of ontologies and knowledge or metaknowledge connected to them are consid...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
The prediction of attacks is essential for the prevention of potential risk. Therefore, risk forecas...
The ubiquity of Internet-connected devices motivates attackers to create malicious programs (malware...
Cybercrime tackling is a major challenge for Law Enforcement Agencies (LEAs). Traditional digital fo...
Malware investigation is a major issue in fighting cybercrime. Because most of the research in this ...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Abstract. We state the benefits of transitioning from taxonomies to ontologies and ontology specific...
Exponential rise of Internet increases the risk of cyber attack related incidents which are generall...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
The structure and basic principles of technology for increasing the probability of identifying subj...
dence from multiple different sources, a short-age of skilled cybercrime agents and inefficient data...
This work introduces an ontological approach for investigating computer involved cases. After explai...
The expansion of technology connectivity and the pervasiveness of data in our society pose both chal...
Ontologies have developed into a prevailing technique for establishing semantic interoperability amo...
Abstract: Different types of ontologies and knowledge or metaknowledge connected to them are consid...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
The prediction of attacks is essential for the prevention of potential risk. Therefore, risk forecas...