On Critical Infrastructure Protection and International Agreements
暂无分享,去创建一个
[1] Frank Stajano,et al. Understanding scam victims , 2011, Commun. ACM.
[2] Nicolas Christin,et al. It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice , 2011, Financial Cryptography.
[3] David Brumley,et al. SplitScreen: Enabling efficient, distributed malware detection , 2010, Journal of Communications and Networks.
[4] Nicolas Christin,et al. Dissecting one click frauds , 2010, CCS '10.
[5] Xavier Litrico,et al. Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.
[6] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[7] Ross J. Anderson,et al. The Economics of Online Crime , 2009 .
[8] Tyler Moore,et al. Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing , 2009, Financial Cryptography.
[9] Tyler Moore,et al. Temporal Correlations between Spam and Phishing Websites , 2009, LEET.
[10] Nicolas Christin,et al. Chapter 5 Peer-to-Peer Networks : Interdisciplinary Challenges for Interconnected Systems , 2009 .
[11] Sven Dietrich,et al. P2P as botnet command and control: A deeper insight , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[12] Chris Kanich,et al. Spamalytics: an empirical analysis of spam marketing conversion , 2008, CCS.
[13] Tyler Moore,et al. Examining the impact of website take-down on phishing , 2007, eCrime '07.
[14] J. Zittrain,et al. Spam Works: Evidence from Stock Touts and Corresponding Market Activity , 2007 .
[15] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[16] Christopher Krügel,et al. Behavior-based Spyware Detection , 2006, USENIX Security Symposium.
[17] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[18] Elaine Shi,et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems , 2005, SOSP '05.
[19] Elaine Shi,et al. BIND: a fine-grained attestation service for secure distributed systems , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[20] Srikanth Kandula,et al. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.
[21] Ahmad-Reza Sadeghi,et al. Property-based attestation for computing platforms: caring about properties, not mechanisms , 2004, NSPW '04.
[22] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[23] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[24] J. Trachtman,et al. Global Cyberterrorism, Jurisdiction, and International Organization , 2004 .
[25] Vern Paxson,et al. A Worst-Case Worm , 2004 .
[26] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[27] Martín Abadi,et al. Logic in access control , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..
[28] Seth D. Schoen,et al. Trusted Computing: Promise and Risk , 2003 .
[29] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[30] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[31] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[32] Peter Mell,et al. Intrusion Detection Systems , 2001 .
[33] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[34] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[35] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[36] Martín Abadi,et al. A calculus for access control in distributed systems , 1991, TOPL.
[37] Y. Yasuhara. The Myth of Free Trade--The Origins of COCOM 1945-1950 , 1991 .
[38] Jerome H. Saltier,et al. Protection of information in computer systems , 1975, IEEE CSIT Newsletter.
[39] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.