Effectiveness of Physical, Social and Digital Mechanisms against Laptop Theft in Open Organizations
暂无分享,去创建一个
[1] Michael Workman,et al. Gaining Access with Social Engineering: An Empirical Study of the Threat , 2007, Inf. Secur. J. A Glob. Perspect..
[2] Serban I. Gavrila,et al. Proximity-Based Authentication for Mobile Devices , 2005, Security and Management.
[3] Luca Cardelli,et al. Mobile Ambients , 1998, FoSSaCS.
[4] Sven Türpe,et al. Attacking the BitLocker Boot Process , 2009, TRUST.
[5] Pieter H. Hartel,et al. Two methodologies for physical penetration testing using social engineering , 2009, ACSAC '10.
[6] Jon Crowcroft,et al. Containment: From context awareness to contextual effects awareness , 2005 .
[7] Pieter H. Hartel,et al. Laptop theft: a case study on the effectiveness of security mechanisms in open organizations , 2010, CCS '10.
[8] Tadayoshi Kohno,et al. Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs , 2008, USENIX Security Symposium.
[9] D. A. Elliott. Opportunities , 2020, Journal of the American Institute of Electrical Engineers.
[10] S. Berg. Snowball Sampling—I , 2006 .
[11] David Scott. Abstracting application-level security policy for ubiquitous computing , 2005 .
[12] Pieter H. Hartel,et al. Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain , 2010, ARSPA-WITS.
[13] Roy H. Campbell,et al. BootJacker: compromising computers using forced restarts , 2008, CCS.
[14] Neil Barrett,et al. Penetration testing and social engineering: Hacking the weakest link , 2003, Inf. Secur. Tech. Rep..
[15] David J. Scott,et al. Spatial policies for sentient mobile applications , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[16] D. Cornish. OPPORTUNITIES, PRECIPITATORS AND CRIMINAL DECISIONS: A REPLY TO WORTLEY'S CRITIQUE OF SITUATIONAL CRIME PREVENTION , 2003 .
[17] Jon Crowcroft,et al. Information exposure control through data manipulation for ubiquitous computing , 2004, NSPW '04.
[18] P Drummond,et al. Can your computer keep a secret? , 1983, Health and social service journal.