A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents' behaviour

SS Hasanabadi, AH Lashkari, AA Ghorbani - Forensic Science International …, 2020 - Elsevier
Digital forensic investigators' aim is identifying, collecting and presenting reliable, accurate,
and admissible evidence in court. However, anti-forensics manipulate, obfuscate, hide, and …

[PDF][PDF] An automatic and proactive identity theft detection model in MMORPGs

J Woo, HJ Choi, HK Kim - Appl. Math, 2012 - naturalspublishing.com
Identity theft happens frequently, especially in popular multiplayer games where cyberassets
can be monetized. In this work, we propose an automatic and proactive identity theft …

Automatic detection of compromised accounts in mmorpgs

J Oh, ZH Borbora, J Srivastava - 2012 International Conference …, 2012 - ieeexplore.ieee.org
Account compromise can occur frequently in popular Massively Multiplayer Online Role-
playing Games (MMORPGs) to gain easy profits and in extreme scenarios, it can lead to …

A game-theoretic defensive approach for forensic investigators against rootkits

SS Hasanabadi, AH Lashkari, AA Ghorbani - Forensic Science International …, 2020 - Elsevier
Forensic science aims to present evidence in the courtroom, in a forensically sound manner.
Therefore, forensic procedures must guarantee the provability, admissibility, accuracy, and …

Irrational coping theory and positive criminology: A framework to protect victims of cyber crime

D Halder, K Jaishankar - Positive criminology, 2015 - taylorfrancis.com
Cyber-crime victims may turn offenders for four main reasons: ie, fear of the harasser; a
revenge attitude towards the offender; anger towards web platforms that may refuse to take …

[图书][B] Working through synthetic worlds

KW Kisiel - 2018 - books.google.com
Virtual environments (VE) are human-computer interfaces in which the computer creates a
sensory-immersing environment that interactively responds to and is controlled by the …

Guarding the Future of Gaming: The Imperative of Cybersecurity

A Ibrahim - 2024 2nd International Conference on Cyber …, 2024 - ieeexplore.ieee.org
The video game landscape has undergone a profound transformation, driven by
technological advances and the widespread influence of online connectivity. However, this …

[图书][B] A socio-legal study of hacking: Breaking and remaking law and technology

MAC Dizon - 2017 - taylorfrancis.com
The relationship between hacking and the law has always been complex and conflict-
ridden. This book examines the relations and interactions between hacking and the law with …

[图书][B] A study on trading scams in massively multiplayer online role-playing games and risk mitigation techniques

TL Meyer - 2011 - search.proquest.com
Scamming in massive multiplayer online role-playing games (MMORPG) has become a
significant issue in gameplay today. With the multitude of MMORPG games to choose from …

[PDF][PDF] Analysis of Japanese loyalty programs considering liquidity, security efforts, and actual security levels

B Jenjarrussakul, K Matsuura - … 13th Workshop on the Economics of …, 2014 - econinfosec.org
Virtual currency is an important medium of exchange in cyber space, and loyalty program
(LP) can be considered as a type of virtual currency. In the US, according to a report in …