Skip to content

Advertisement

Cyber-Crime: New Trends, Challenges and Detection

Societies in today’s world are becoming more and more dependent on open networks such as Internet where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and information security issues which are utilized by cyber criminals.

Edited by: Yali Liu, Wojciech Mazurczyk, Krzysztof Szczypiorski and Hui Tian

  1. Content type: Research

    This paper proposes a novel steganography technique, where edges in the cover image have been used to embed messages. Amount of data to be embedded plays an important role on the selection of edges, i.e., the ...

    Authors: Saiful Islam, Mangat R Modi and Phalguni Gupta

    Citation: EURASIP Journal on Information Security 2014 2014:8

    Published on:

  2. Content type: Research

    419 scam (also referred to as Nigerian scam) is a popular form of fraud in which the fraudster tricks the victim into paying a certain amount of money under the promise of a future, larger payoff.

    Authors: Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Aurélien Francillon and David Balzarotti

    Citation: EURASIP Journal on Information Security 2014 2014:4

    Published on:

  3. Content type: Research

    Wireless sensor networks (WSNs) are gaining more and more interest in the research community due to their unique characteristics. Besides energy consumption considerations, security has emerged as an equally i...

    Authors: Eirini Karapistoli and Anastasios A Economides

    Citation: EURASIP Journal on Information Security 2014 2014:3

    Published on:

  4. Content type: Research

    The manual forensics investigation of security incidents is an opaque process that involves the collection and correlation of diverse evidence. In this work we first conduct a complex experiment to expand our ...

    Authors: Elias Raftopoulos and Xenofontas Dimitropoulos

    Citation: EURASIP Journal on Information Security 2013 2013:7

    Published on:

  5. Content type: Research

    The Internet is an essential tool for everyday tasks. Aside from common use, the option to browse the Internet privately is a desirable attribute. However, this can create a problem when private Internet sessi...

    Authors: Donny J Ohana and Narasimha Shashidhar

    Citation: EURASIP Journal on Information Security 2013 2013:6

    Published on:

  6. Content type: Research

    Spam is a vector for cybercrime and commonly legally prohibited. Why do certain national jurisdictions produce a higher percentage of spam than others despite its prohibition? Why do some countries have a high...

    Authors: Vaibhav Garg, Thomas Koster and Linda Jean Camp

    Citation: EURASIP Journal on Information Security 2013 2013:3

    Published on:

  7. Content type: Research

    This paper analyses and proposes a novel detection strategy for the 'Chameleon’ WiFi AP-AP virus. Previous research has considered virus construction, likely virus behaviour and propagation methods. The resear...

    Authors: Jonny Milliken, Valerio Selis and Alan Marshall

    Citation: EURASIP Journal on Information Security 2013 2013:2

    Published on: