暂无分享,去创建一个
[1] Charles Doyle,et al. Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws , 2010 .
[2] Mike Bond,et al. 2010 IEEE Symposium on Security and Privacy Chip and PIN is Broken , 2022 .
[3] Jorge L. Contreras. Developing a Framework to Improve Critical Infrastructure Cybersecurity (Response to NIST Request for Information Docket No. 130208119-3119-01) , 2013 .
[4] Lorrie Faith Cranor,et al. Crying Wolf: An Empirical Study of SSL Warning Effectiveness , 2009, USENIX Security Symposium.
[5] Adrienne Porter Felt,et al. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness , 2013, USENIX Security Symposium.
[6] Steven J. Murdoch,et al. EMV: why payment systems fail , 2014, CACM.
[7] Ross J. Anderson,et al. Reading this may harm your computer: The psychology of malware warnings , 2014, Comput. Hum. Behav..