Skip to main content

Cyber-Crime: New Trends, Challenges and Detection

Societies in today’s world are becoming more and more dependent on open networks such as Internet where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and information security issues which are utilized by cyber criminals.

Edited by: Yali Liu, Wojciech Mazurczyk, Krzysztof Szczypiorski and Hui Tian

  1. This paper proposes a novel steganography technique, where edges in the cover image have been used to embed messages. Amount of data to be embedded plays an important role on the selection of edges, i.e., the ...

    Authors: Saiful Islam, Mangat R Modi and Phalguni Gupta
    Citation: EURASIP Journal on Information Security 2014 2014:8
  2. 419 scam (also referred to as Nigerian scam) is a popular form of fraud in which the fraudster tricks the victim into paying a certain amount of money under the promise of a future, larger payoff.

    Authors: Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Aurélien Francillon and David Balzarotti
    Citation: EURASIP Journal on Information Security 2014 2014:4
  3. Wireless sensor networks (WSNs) are gaining more and more interest in the research community due to their unique characteristics. Besides energy consumption considerations, security has emerged as an equally i...

    Authors: Eirini Karapistoli and Anastasios A Economides
    Citation: EURASIP Journal on Information Security 2014 2014:3
  4. The manual forensics investigation of security incidents is an opaque process that involves the collection and correlation of diverse evidence. In this work we first conduct a complex experiment to expand our ...

    Authors: Elias Raftopoulos and Xenofontas Dimitropoulos
    Citation: EURASIP Journal on Information Security 2013 2013:7
  5. The Internet is an essential tool for everyday tasks. Aside from common use, the option to browse the Internet privately is a desirable attribute. However, this can create a problem when private Internet sessi...

    Authors: Donny J Ohana and Narasimha Shashidhar
    Citation: EURASIP Journal on Information Security 2013 2013:6
  6. Spam is a vector for cybercrime and commonly legally prohibited. Why do certain national jurisdictions produce a higher percentage of spam than others despite its prohibition? Why do some countries have a high...

    Authors: Vaibhav Garg, Thomas Koster and Linda Jean Camp
    Citation: EURASIP Journal on Information Security 2013 2013:3
  7. This paper analyses and proposes a novel detection strategy for the 'Chameleon’ WiFi AP-AP virus. Previous research has considered virus construction, likely virus behaviour and propagation methods. The resear...

    Authors: Jonny Milliken, Valerio Selis and Alan Marshall
    Citation: EURASIP Journal on Information Security 2013 2013:2