Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Daniel R. Thomas"'
Publikováno v:
Journal of Economic Criminology, Vol 6, Iss , Pp 100103- (2024)
Cybercrime is under-reported in Scotland, with the reasons for this being poorly understood. To investigate underreporting, we commenced with a search of the related research and then carried out a review of actual cases. Next, to uncover Scottish-sp
Externí odkaz:
https://doaj.org/article/3b2b8b7b89554d0fae9dfda705cd0899
Publikováno v:
Nature Human Behaviour. 5:716-725
Dimensions of human mood, behaviour and vital signs cycle over multiple timescales. However, it remains unclear which dimensions are most cyclical, and how daily, weekly, seasonal and menstrual cycles compare in magnitude. The menstrual cycle remains
Publikováno v:
Dental Hypotheses, Vol 2, Iss 2, Pp 74-82 (2011)
Introduction: Variant creutzfeldt jakob disease (vCJD) is the hu-man neurological disease known to be caused by the same proteinaceous infectious agent (“prion”) that causes Bovine Spongiform Encephalopathy or "Mad Cow Disease". Two un-usual and
Externí odkaz:
https://doaj.org/article/709ca8c7e45e4cea992dcfbfd5dea498
Autor:
Daniel R Thomas
Publikováno v:
Journal of Peace Research. :002234332210969
Theories explaining why states choose to use targeted or indiscriminate violence against civilians hinge on the state’s capacity to gain information about who to target and its ability to do enough damage to prevent defection to the rebel’s side.
Publikováno v:
Collier, B, Clayton, R, Hutchings, A & Thomas, D 2021, ' Cybercrime is (often) boring : Infrastructure and alienation in a deviant subculture ', The British Journal of Criminology: An International Review of Crime and Society (BJC), vol. 61, no. 5, azab026, pp. 1407–1423 . https://doi.org/10.1093/bjc/azab026
The boredom and alienation produced by capitalist societies and countervailing forces of attraction and excitement are at the heart of the subcultural account of crime. The underground hacker subculture is no exception, commonly represented as based
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d8c02f49e9a7a9cf0f333cf9d94bcd3d
https://www.pure.ed.ac.uk/ws/files/205703538/CollierEtalBJC2021CybercrimeIsOftenBoring.pdf
https://www.pure.ed.ac.uk/ws/files/205703538/CollierEtalBJC2021CybercrimeIsOftenBoring.pdf
We document and evaluate emerging policing strategies that are reshaping how centralised law enforcement agencies deal with online cybercrime markets. The first of these we term infrastructural policing, drawn from law enforcement campaigns to disrup
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4bc60e82ac062c69d79bca17221830b9
https://strathprints.strath.ac.uk/75302/7/Collier_etal_PS_2021_Influence_infrastructure_and_recentering_cybercrime_policing.pdf
https://strathprints.strath.ac.uk/75302/7/Collier_etal_PS_2021_Influence_infrastructure_and_recentering_cybercrime_policing.pdf
Publikováno v:
Security Protocols XXVII ISBN: 9783030570422
Security Protocols Workshop
27th International Workshop on Security Protocols
Security Protocols Workshop
27th International Workshop on Security Protocols
Modern smartphone messaging apps now use end-to-end encryption to provide authenticity, integrity and confidentiality. Consequently, the preferred strategy for wiretapping such apps is to insert a ghost user by compromising the platform's public key
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fe84cf15905f6af01692b768bf3680d5
https://doi.org/10.1007/978-3-030-57043-9_23
https://doi.org/10.1007/978-3-030-57043-9_23
Autor:
de Oca, J.C. Roa Montes, Estella, J.M. Gonçalves, Berhouma, M., Cornelius, J.F., Daniel, R. Thomas, Froelich, S., Jouanneau, E., Mazzatenta, D., Roche, P.H., Tatagiba, M., Visocchi, M., Zazpe, I., Meling, T., Messerer, M., Paraskevopoulos, D., Schroeder, H.W. Siegfried, Ekkehard, K., Bruneau, M.
Publikováno v:
In Neurocirugía May 2023 34 Supplement 1:S14-S15
Publikováno v:
Internet Measurement Conference
Illegal booter services offer denial of service (DoS) attacks for a fee of a few tens of dollars a month. Internationally, police have implemented a range of different types of intervention aimed at those using and offering booter services, including
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a0eeecd4ebf2f9002287c4edcd06a801
https://strathprints.strath.ac.uk/70746/1/Collier_etal_ACM_2019_evaluating_the_effects_of_police_interventions_in_the_market_for_denial_of_service_attacks.pdf
https://strathprints.strath.ac.uk/70746/1/Collier_etal_ACM_2019_evaluating_the_effects_of_police_interventions_in_the_market_for_denial_of_service_attacks.pdf
eWhoring is the term used by offenders to refer to a type of online fraud in which cybersexual encounters are simulated for financial gain. Perpetrators use social engineering techniques to impersonate young women in online communities, e.g., chat or
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4c41b8a9a3077fd6392ab32645518cf6
https://strathprints.strath.ac.uk/70749/1/Pastrana_etal_ACM_2019_Measuring_eWhoring.pdf
https://strathprints.strath.ac.uk/70749/1/Pastrana_etal_ACM_2019_Measuring_eWhoring.pdf