Comprehensive Review of Cybercrime Detection Techniques

dc.cclicenceCC-BYen
dc.contributor.authorAhmed, Abdulghani Ali
dc.contributor.authorAl-Khater, Wadha Abdullah
dc.contributor.authorAl-Maadeed, Somaya
dc.contributor.authorSadiq, Ali Safaa
dc.contributor.authorKhan, Muhammad Khurram
dc.date.accessioned2020-11-02T16:20:11Z
dc.date.available2020-11-02T16:20:11Z
dc.date.issued2020-07-22
dc.description© 2020 The Authors. Published by IEEE. This is an open access article available under a Creative Commons licence. The published version can be accessed at the following link on the publisher’s website: https://doi.org/10.1109/ACCESS.2020.3011259en
dc.description.abstractCybercrimes are cases of indictable offences and misdemeanors that involve computers or communication tools as targets and commission instruments or are associated with the prevalence of computer technology. Common forms of cybercrimes are child pornography, cyberstalking, identity theft, cyber laundering, credit card theft, cyber terrorism, drug sale, data leakage, sexually explicit content, phishing, and other forms of cyber hacking. They mostly lead to a privacy breach, security violation, business loss, financial fraud, or damage in public and government properties. Thus, this study intensively reviews cybercrime detection and prevention techniques. It first explores the different types of cybercrimes and discusses their threats against privacy and security in computer systems. Then, it describes the strategies that cybercriminals may utilize in committing these crimes against individuals, organizations, and societies. It also reviews the existing techniques of cybercrime detection and prevention. It objectively discusses the strengths and critically analyzes the vulnerabilities of each technique. Finally, it provides recommendations for the development of a cybercrime detection model that can detect cybercrimes effectively compared with the existing techniques.en
dc.funderOther external funder (please detail below)en
dc.funder.otherQatar National Research Fund (a member of the Qatar Foundation).en
dc.identifier.citationAl-Khater, W.A., Al-Maadeed, S., Ahmed, A.A., Sadiq, A.S. and Khan, M.K. (2020) Comprehensive Review of Cybercrime Detection Techniques. IEEE Access, 8, pp. 137293-137311en
dc.identifier.doihttps://doi.org/10.1109/ACCESS.2020.3011259
dc.identifier.issn2169-3536
dc.identifier.urihttps://dora.dmu.ac.uk/handle/2086/20353
dc.language.isoenen
dc.peerreviewedYesen
dc.projectidNPRP grant # NPRP12S-0312-190332en
dc.publisherIEEEen
dc.researchinstituteCyber Technology Institute (CTI)en
dc.subjectSecurityen
dc.subjectCybercrime detection techniquesen
dc.subjectNeural networken
dc.subjectFuzzy logicen
dc.subjectMachine learningen
dc.subjectData miningen
dc.titleComprehensive Review of Cybercrime Detection Techniquesen
dc.typeArticleen

Files

License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
4.2 KB
Format:
Item-specific license agreed upon to submission
Description: