[
1. Bequai, A. (1998). Guide to cyber-crime investigations. Computers and Security, 17(7), 579 – 582. http://130.18.86.27/faculty/warkentin/SecurityPapers/Robert/Others/Bequai1998_C%26S17_CyberCrimeInvestigations.pdf10.1016/S0167-4048(99)80056-X
]Search in Google Scholar
[
2. Benjamin, R., Gladman, B. and Randell, B. (1998). Protecting IT Systems from Cyber Crime. Computer Journal, 41(7), 429 – 443. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.554310.1093/comjnl/41.7.429
]Search in Google Scholar
[
3. Bolton, R. J. and Hand, D. J. (2002). Statistical fraud detection: A review. Statistical science, 17(3), 235 – 255. https://projecteuclid.org/journals/statistical-science/volume-17/issue-3/Statistical-Fraud-Detection-A-Review/10.1214/ss/1042727940.short10.1214/ss/1042727940
]Search in Google Scholar
[
4. Choo, K.-K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers and Security, 30(8), 719 – 731. https://dl.acm.org/doi/10.1016/j.cose.2011.08.00410.1016/j.cose.2011.08.004
]Search in Google Scholar
[
5. Colladon, A. F. and Remondi, E. (2017). Using social network analysis to prevent money laundering. Expert Systems with Applications, 67, 49 – 58. https://arxiv.org/abs/2105.0579310.1016/j.eswa.2016.09.029
]Search in Google Scholar
[
6. FATF (2001). The FATF Recommendations. https://www.fatf-gafi.org/publications/fatfrecommendations/documents/fatf-recommendations.html.
]Search in Google Scholar
[
7. Feily, M., Shahrestani, A., and Ramadass, S. (2009, June). A survey of botnet and botnet detection. In 2009 Third International Conference on Emerging Security Information, Systems and Technologies, 268-273. https://www.semanticscholar.org/paper/A-Survey-of-Botnet-and-Botnet-Detection-Feily-Shahrestani/629e73e938469e92da0d225ed9de71524d3df673
]Search in Google Scholar
[
8. Harpum, C. (1990). Liability for money laundering. The Cambridge Law Journal, 49(2), 217 – 220. https://www.cambridge.org/core/journals/cambridge-law-journal/article/liability-for-money-laundering/3EA770607A3558CB3DDA01FE064FFF9210.1017/S0008197300116976
]Search in Google Scholar
[
9. Huang, Q., Singh, V. K. and Atrey, P. K. (2014, November). Cyber bullying detection using social and textual analysis. In Proceedings of the 3rd International Workshop on Socially-Aware Multimedia, 3-6. https://dl.acm.org/doi/abs/10.1145/2661126.266113310.1145/2661126.2661133
]Search in Google Scholar
[
10. Hutchings, A. and Holt, T. J. (2015). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596 – 614. https://www.jstor.org/stable/4381929910.1093/bjc/azu106
]Search in Google Scholar
[
11. IBM (2022). How much does a data breach cost in 2022? https://www.ibm.com/security/data-breach
]Search in Google Scholar
[
12. Juels, A., Kosba, A. and Shi, E. (2016, October). The ring of gyges: Investigating the future of criminal smart contracts. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 283-295. https://dl.acm.org/doi/10.1145/2976749.297836210.1145/2976749.2978362
]Search in Google Scholar
[
13. Kolodenker, E., Koch, W., Stringhini, G. and Egele, M. (2017, April). Paybreak: Defense against cryptographic ransomware. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 599-611. https://dl.acm.org/doi/10.1145/3052973.305303510.1145/3052973.3053035
]Search in Google Scholar
[
14. Möser, M., Böhme, R. and Breuker, D. (2013, September). An inquiry into money laundering tools in the Bitcoin ecosystem. In 2013 APWG eCrime researchers summit, 1-14. Ieee. https://ieeexplore.ieee.org/document/680578010.1109/eCRS.2013.6805780
]Search in Google Scholar
[
15. Mumford, Е. (1998). Problems, knowledge, solutions: Solving complex problems. Journal of Strategic Information Systems, 7(4), 255 – 269. https://ur.booksc.me/book/14256753/884f6810.1016/S0963-8687(99)00003-7
]Search in Google Scholar
[
16. Ngai, E. W., Hu, Y., Wong, Y. H., Chen, Y. and Sun, X. (2011). The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decision support systems, 50(3), 559 – 569. https://www.sciencedirect.com/science/article/pii/S016792361000130210.1016/j.dss.2010.08.006
]Search in Google Scholar
[
17. OAS (1994). The Council of Europe Convention on Cybercrime: status quo and future challenges. Retrieved from August 1, 2022. http://www.oas.org/juridico/english/cyb_pry_coe.pdf
]Search in Google Scholar
[
18. Ruan, K., Carthy, J., Kechadi, T. and Baggili, I. (2013). Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results. Digital Investigation, 10(1), 34 – 43. https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/23/10.1016/j.diin.2013.02.004
]Search in Google Scholar
[
19. Tounsi, W. and Rais, H. (2018). A survey on technical threat intelligence in the age of sophisticated cyber attacks. Computers and Security, 72, 212 – 233. https://dl.acm.org/doi/10.1016/j.cose.2017.09.00110.1016/j.cose.2017.09.001
]Search in Google Scholar