Cyber-crime has reached unprecedented proportions in this day and age. In addition, the internet has created a world with seemingly no barriers while making a countless number of ...
Abstract. Both fuzzy set theory and rough set theory play an important role in data-driven, systems modelling and analysis. They have been successfully applied to building various ...
In this paper, it is shown how behavioural properties can be specified for three types of violent criminals. Moreover, it is shown how empirical material in the form of informal de...
A new topic of great relevance and concern has been the design of efficient early warning systems to detect as soon as possible the emergence of spatial clusters. In particular, m...
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...