Mobile Application Category Cybercrime To Filter The Content Using Ontology
Abstract
Full Text:
PDFReferences
Amir Mohamed Talib, FO 2013."Towardsa Comprehensive Ontology-Based Digital Forensics
Investigation for Cybercrime". International Journal on Communications Antenna and
Propagation (I.Re.CAP), Vol. 5, N.
Jasmin Cosic, ZC, 2011."Anontological Approach to Study and Manage Digital Chain of Custody
of DigitalEvidence".UDC 004 822: 004 056 Communications Preliminary Article, Submitted
/11; Accepted 06/11, JIOS, VOL. 35, NO. 1 (2011).
Megha Mudholkar, UB 2013."AStudy on Significance of Event Web Ontology Approach in Crime
Mining". International Journal of Latest Trends in Engineering and Technology (IJLTET) Vol.
Issue 2, ISSN: 2278-621X.
Namosha Veerasamy, MG 2012."Buildingan Ontology forCyberterrorism".Taken from
https://www.researchgate.net/publication/266055691_Building_an_Ontology_for_Cyberterror
ism
(2013), G. 2013. Understanding Cybercrime According to the experts. Taken from
http://ogapermana.blogspot.co.id/2013/04/pengertian-cyber-crime-menurut-para-ahli_11.html
Amardi, R .. 2013. Definitions Hackers and Crackers According to Experts. Taken from
https://roniamardi.wordpress.com/definisi-hacker-cracker/
Bumulo, DR 2017. Carding Type Case Study Analysis By Experts. Taken from
http://akhirnyadennieskuliah.blogspot.co.id/2014/11/analisa-study-kasus-jenis-carding.html
KBBI. 2017. The meaning of the word Internet - Indonesian Dictionary (KBBI) Online. Taken
from http://kbbi.web.id/internet
KBBI. 2017. The meaning of Classification - Big Indonesian Dictionary (KBBI) Online. Taken
from http://kbbi.web.id/klasifikasi
Kurniawan, A. 2013. Analysis 13 Definition World 'According to the experts. Taken from
http://www.gurupendidikan.com/13-pengertian-analisis-menurut-para-ahli-didunia/
Oktaviandy, N. 2012. Research Methods Experiment. Taken from
https://navelmangelep.wordpress.com/2012/02/27/metode-penelitan-eksperimen/
SURABAYA, IT 2007. Understanding and Application of Experimental Methods in Research.
Taken from https://idtesis.com/metode-eksperimental/
Syrozone, A. d. 2012. Hackers and Crackers: Hacker. Taken from
http://kelompok1hackercracker.blogspot.co.id/2012/11/pengertian-hacker_2.html
Trianto, M. 2013. Methods According Sugiyono. Taken from http://rayendar.blogspot.co.id/2015/06/metode-penelitian-menurut-sugiyono-2013.html
Refbacks
- There are currently no refbacks.
International Conference on Engineering and Technology Development (ICETD)
Bandar Lampung University
ISSN: 2301-5690