Results (4)
Search Parameters:
Keyword: IllegalBehavioral Analysis of Bitcoin Users on Illegal Transactions
Bitcoin is a popular crypto currency that is used as a mode of investment and a medium for trading goods and services. Anonymity, security and decentralization are significant features of Bitcoin. This creates several opportunities for criminals to involve in illegal and fraudulent activities. This research study aimed to automate the process of gaining the…
Read MoreVehicle Number Plate Detection and Recognition Techniques: A Review
Vehicle number plate detection and recognition is an integral part of the Intelligent Transport System (ITS) as every vehicle has a number plate as part of its identity. The quantity of vehicles on road is growing in the modern age, so numerous crimes are also increasing day by day. Almost every day the news of…
Read MoreDefeating Anti-Debugging Techniques for Malware Analysis Using a Debugger
Cyberattacks such as spear phishing and malspam pretending to be companies, institutes, and government officials are increasing and evolving. Malware has a variety of purposes, such as collecting personal information and illegal access to the system. New types of malware are increasing every day, and many malware programs spread all over the Internet, causing severe…
Read MoreA Systematic Literature Review of Vessel Anomaly Behavior Detection Methods Based on Automatic Identification System (AIS) and another Sensor Fusion
The high flow of vessel traffic affects the difficulty of monitoring vessel in the middle of the sea because of limited human visibility, occurrence of vessel accidents at the sea and other illegal activities that illustrate abnormal vessel behavior such as oil bunkering, piracy, illegal fishing and other crimes that will continue and will certainly…
Read More
