{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:34:50Z","timestamp":1769632490297,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"DOI":"10.1145\/2393216.2393267","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"301-305","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Survey of cyber crime activities and preventive measures"],"prefix":"10.1145","author":[{"given":"P.","family":"Ramesh","sequence":"first","affiliation":[{"name":"RVS College of Arts and Science"}]},{"given":"D.","family":"Maheswari","sequence":"additional","affiliation":[{"name":"RVS College of Arts and Science"}]}],"member":"320","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/cybercellmumbai.gov.in\/  http:\/\/cybercellmumbai.gov.in\/"},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/www.cyberlawsindia.net\/internet-crime.html  http:\/\/www.cyberlawsindia.net\/internet-crime.html"},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/www.ankitfadia.in\/  http:\/\/www.ankitfadia.in\/"},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/www.fbi.gov\/about-us\/investigate\/cyber\/cyber  http:\/\/www.fbi.gov\/about-us\/investigate\/cyber\/cyber"},{"key":"e_1_3_2_1_5_1","unstructured":"http:\/\/wikipedia.org\/wiki\/Hacker_computer_security  http:\/\/wikipedia.org\/wiki\/Hacker_computer_security"},{"key":"e_1_3_2_1_6_1","volume-title":"cryptography and network security principles and practice","year":"2000","unstructured":"cryptography and network security principles and practice third edition by william stallings, 2000 cryptography and network security principles and practice third edition by william stallings, 2000"},{"key":"e_1_3_2_1_7_1","volume-title":"Cyber Law in India Law on Internet","year":"2011","unstructured":"Cyber Law in India Law on Internet first edition by Farooq Ahmad 2011 Cyber Law in India Law on Internet first edition by Farooq Ahmad 2011"},{"key":"e_1_3_2_1_8_1","unstructured":"Cyber Crime Criminal Threats From Cyberspace by Susan W Brenner 2010  Cyber Crime Criminal Threats From Cyberspace by Susan W Brenner 2010"},{"key":"e_1_3_2_1_9_1","volume-title":"Cyber Crime in India","year":"2000","unstructured":"Cyber Crime in India first edition by Dr M Dasgupta 2000 Cyber Crime in India first edition by Dr M Dasgupta 2000"},{"key":"e_1_3_2_1_10_1","unstructured":"Cyber Power and National Security vol 2 by Franklin D Kramer Stuart H Starr.2009  Cyber Power and National Security vol 2 by Franklin D Kramer Stuart H Starr.2009"},{"key":"e_1_3_2_1_11_1","unstructured":"Linux Server Security third edition by Michael D. Bauer 1999  Linux Server Security third edition by Michael D. Bauer 1999"}],"event":{"name":"CCSEIT '12: The Second International Conference on Computational Science, Engineering","location":"Coimbatore UNK India","acronym":"CCSEIT '12","sponsor":["Avinashilingam University Avinashilingam University"]},"container-title":["Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393267","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393216.2393267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:47Z","timestamp":1750240487000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393267"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":11,"alternative-id":["10.1145\/2393216.2393267","10.1145\/2393216"],"URL":"https:\/\/doi.org\/10.1145\/2393216.2393267","relation":{},"subject":[],"published":{"date-parts":[[2012,10,26]]},"assertion":[{"value":"2012-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}