Data mining : how hackers steal sensitive electronic information
Year of publication: |
2009
|
---|---|
Authors: | Smith, Gordon |
Published in: |
The journal of corporate accounting & finance. - Hoboken, NJ : Wiley, ISSN 1044-8136, ZDB-ID 1113073-8. - Vol. 20.2008/09, 4, p. 23-26
|
Subject: | IT-Kriminalität | IT crime | Data Mining | Data mining |
-
Detecting cyber threats through social network analysis : short survey
Lyudmyla, Kirichenko, (2017)
-
Predictive models in cybercrime investigation : an application of data mining techniques
Murthy, A. S. N., (2010)
-
Identifying and profiling key sellers in cyber carding community : AZSecure text mining system
Li, Weifeng, (2016)
- More ...
-
A System Perspective on Party System Change
Smith, Gordon, (1989)
-
Regulars - Expert Witness - The future for enterprise support
Smith, Gordon, (2000)
-
Experience, contractual covenants and venture capitalists' responses to unmet expectations
Parhankangas, Annaleena, (2005)
- More ...