Empirical Research and Research Ethics in Information Security
暂无分享,去创建一个
Edgar R. Weippl | Sebastian Schrittwieser | Sylvi Rennert | E. Weippl | S. Schrittwieser | Sylvi Rennert
[1] Yada Zhu,et al. Social Phishing , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[2] Stefan Lindskog,et al. Spoiled Onions: Exposing Malicious Tor Exit Relays , 2014, Privacy Enhancing Technologies.
[3] M. Bailey,et al. Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report , 2013 .
[4] E. Weippl,et al. Ethics in security research which lines should not be crossed? , 2013, 2013 IEEE Security and Privacy Workshops.
[5] Stefan Savage,et al. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs , 2012, USENIX Security Symposium.
[6] D. Dittrich,et al. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research , 2012 .
[7] W. Douglas Maughan,et al. The Menlo Report , 2012, IEEE Security & Privacy.
[8] S. Athar. Principles of Biomedical Ethics , 2011, The Journal of IMA.
[9] Edgar R. Weippl,et al. Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites , 2010, SEC.
[10] Edgar R. Weippl,et al. Tor HTTP Usage and Information Leakage , 2010, Communications and Multimedia Security.
[11] Christopher Krügel,et al. Is the Internet for Porn? An Insight Into the Online Adult Industry , 2010, WEIS.
[12] A. Dörries. The 4-Step Approach - Ethics case discussion in hospitals , 2009 .
[13] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[14] Chris Kanich,et al. Spamalytics: an empirical analysis of spam marketing conversion , 2009, CACM.
[15] Vijay S. Pande,et al. Folding@home: Lessons from eight years of volunteer distributed computing , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.
[16] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[17] C. Weijer,et al. Helsinki discords: FDA, ethics, and international drug trials , 2009, The Lancet.
[18] Dirk Grunwald,et al. Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.
[19] A. Dörries. Mixed Feelings: Physicians' Concerns About Clinical Ethics Committees in Germany , 2003, HEC forum : an interdisciplinary journal on hospitals' ethical and legal issues.
[20] B. Gordijn,et al. Ethical case deliberation on the ward. A comparison of four methods , 2003, Medicine, health care, and philosophy.
[21] David P. Anderson,et al. SETI@home: an experiment in public-resource computing , 2002, CACM.
[22] Norbert Steinkamp,et al. Die Nimwegener Methode für ethische Fallbesprechungen , 2000 .
[23] J. Thomson,et al. Embryonic stem cell lines derived from human blastocysts. , 1998, Science.
[24] Ken Thompson,et al. Reflections on trusting trust , 1984, CACM.