A classification of computer security incidents based on reported attack data
暂无分享,去创建一个
[1] U. Foa,et al. NEW DEVELOPMENTS IN FACET DESIGN AND ANALYSIS. , 1965, Psychological review.
[2] Karen Huffman. Psychology in Action , 1987 .
[3] David V. Canter,et al. Facet theory : approaches to social research , 1985 .
[4] Donn B. Parker,et al. Fighting computer crime - a new framework for protecting information , 1998 .
[5] D Canter,et al. The application of an action system model to destructive behaviour: the examples of arson and terrorism. , 2001, Behavioral sciences & the law.
[6] D. Canter,et al. Differentiating arsonists: A model of firesetting actions and characteristics , 1998 .
[7] D V Canter,et al. Linking commercial burglaries by modus operandi: tests using regression and ROC analysis. , 2002, Science & justice : journal of the Forensic Science Society.
[8] Bill Landreth. Out of the Inner Circle , 1985 .
[9] J. Lingoes. The Multivariate Analysis Of Qualitative Data , 1968 .
[10] David V. Canter,et al. A multivariate model of sexual offence behaviour: Developments in ‘offender profiling'. I. , 1990 .
[11] David V. Canter,et al. Offender profiling and investigative psychology , 2004 .
[12] Nicolas Chantler,et al. Profile of A Computer Hacker , 2001 .