A survey of cyber crimes
暂无分享,去创建一个
[1] Keith Mayes,et al. An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing , 2010, Int. J. Secur. Networks.
[2] Indrajit Ray,et al. Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents , 2008, Int. J. Secur. Networks.
[3] Liqun Chen,et al. On security proof of McCullagh?Barreto's key agreement protocol and its variants , 2007, Int. J. Secur. Networks.
[4] Scott Lobdell,et al. Identity Theft , 2006 .
[5] Monica T. Whitty,et al. Cyberstalking: Harassment in the Internet Age and How to Protect your Family. By Paul Bocij (Westport, USA: Praeger Publishers, 2004, xiv+268pp. £22.98 hb) , 2004 .
[6] George Kesidis,et al. A taxonomy of internet traceback , 2006, Int. J. Secur. Networks.
[7] Ju Wang,et al. A cross-layer authentication design for secure video transportation in wireless sensor network , 2010, Int. J. Secur. Networks.
[8] Thomas Johansson,et al. Three ways to mount distinguishing attacks on irregularly clocked stream ciphers , 2006, Int. J. Secur. Networks.
[9] Kamil Saraç,et al. Single packet IP traceback in AS-level partial deployment scenario , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[10] Neeraj Suri,et al. An approach to synthesise safe systems , 2006, Int. J. Secur. Networks.
[11] Jie Wu,et al. Clique-based group key assignment in Wireless Sensor Networks , 2008, Int. J. Secur. Networks.
[12] Chao Chen,et al. Deriving a closed-form expression for worm-scanning strategies , 2009, Int. J. Secur. Networks.
[13] Adel Bouhoula,et al. Firewall filtering rules analysis for anomalies detection , 2008, Int. J. Secur. Networks.
[14] Debra Littlejohn Shinder,et al. Scene of the Cybercrime , 2002 .
[15] Yuval Elovici,et al. Google Android: A Comprehensive Security Assessment , 2010, IEEE Security & Privacy.
[16] Fei Hu,et al. Towards a realistic testbed for wireless network reliability and security performance studies , 2008, Int. J. Secur. Networks.
[17] Raheem A. Beyah,et al. Using link RTT to passively detect unapproved wireless nodes , 2009, Int. J. Secur. Networks.
[18] Thomas Magedanz,et al. Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks , 2009, Int. J. Secur. Networks.
[19] David Bailey. Attacks on Computers: Congressional Hearings and Pending Legislation , 1984, 1984 IEEE Symposium on Security and Privacy.
[20] Shahram Latifi,et al. An iris and retina multimodal biometric system , 2008, Int. J. Secur. Networks.
[21] Claudio Soriente,et al. Secure pairing of interface constrained devices , 2009, Int. J. Secur. Networks.
[22] Bing Wu,et al. Experimental analysis of application-level intrusion detection algorithms , 2010, Int. J. Secur. Networks.
[23] Reuven R. Levary,et al. An adaptive expert system approach for intrusion detection , 2006, Int. J. Secur. Networks.
[24] Elisa Bertino,et al. Workflow authorisation in mediator-free environments , 2006, Int. J. Secur. Networks.
[25] Mark A. Shayman,et al. On pairwise connectivity of wireless multihop networks , 2007, Int. J. Secur. Networks.
[26] Robin Berthier,et al. An evaluation of connection characteristics for separating network attacks , 2009, Int. J. Secur. Networks.
[27] Taieb Znati,et al. End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks , 2007, Int. J. Secur. Networks.
[28] Yi-Bing Lin,et al. End-to-end security mechanisms for SMS , 2006, Int. J. Secur. Networks.
[29] Yi-Bing Lin,et al. NTP-DownloadT: a conformance test tool for secured mobile download services , 2008, Int. J. Secur. Networks.
[30] L. Sun,et al. Security and privacy on low-cost Radio Frequency Identification systems , 2010, Int. J. Secur. Networks.
[31] Michele L. Ybarra,et al. Online "predators" and their victims: myths, realities, and implications for prevention and treatment. , 2008, The American psychologist.
[32] Jamal N. Al-Karaki,et al. Analysis of routing security-energy trade-offs in wireless sensor networks , 2006, Int. J. Secur. Networks.
[33] Ying Li,et al. Enhancing Intrusion Detection System with proximity information , 2010, Int. J. Secur. Networks.
[34] Krishna M. Sivalingam,et al. An efficient One-Time Password authentication scheme using a smart card , 2009, Int. J. Secur. Networks.
[35] Tzong-Chen Wu,et al. Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks , 2010, Int. J. Secur. Networks.
[36] Kiseon Kim,et al. Security assessments of IEEE 802.15.4 standard based on X.805 framework , 2010, Int. J. Secur. Networks.
[37] Mukesh Singhal,et al. An escrow-less identity-based group-key agreement protocol for dynamic peer groups , 2009, Int. J. Secur. Networks.
[38] Pei Cao,et al. Hash-AV: fast virus signature scanning by cache-resident filters , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[39] Micah Sherr,et al. On the (un)reliability of eavesdropping , 2008, Int. J. Secur. Networks.
[40] Aggelos Kiayias,et al. Secure scalable group signature with dynamic joins and separable authorities , 2006, Int. J. Secur. Networks.
[41] Hairong Qi,et al. Load-balanced key establishment methodologies in wireless sensor networks , 2006, Int. J. Secur. Networks.
[42] Constantinos E. Goutis,et al. Server side hashing core exceeding 3 Gbps of throughput , 2007, Int. J. Secur. Networks.
[43] Martin Feldhofer,et al. On the security of RFID devices against implementation attacks , 2010, Int. J. Secur. Networks.
[44] Barry E. Mullins,et al. Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks , 2007, Int. J. Secur. Networks.
[45] Sven Laur,et al. User-aided data authentication , 2009, Int. J. Secur. Networks.
[46] WangXinyuan. The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones , 2006 .
[47] Lmm Lambèr Royakkers. The Dutch approach to stalking laws , 2000 .
[48] Lillykutty Jacob,et al. Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks , 2008, Int. J. Secur. Networks.
[49] Abdelmadjid Bouabdallah,et al. TKS: a transition key management scheme for secure application level multicast , 2009, Int. J. Secur. Networks.
[50] Mahalingam Ramkumar,et al. Secure collaborations over message boards , 2006, Int. J. Secur. Networks.
[51] Ali Movaghar-Rahimabadi,et al. Anonymous authentication protocol for GSM networks , 2008, Int. J. Secur. Networks.
[52] Hsiao-Hwa Chen,et al. DKMS: distributed hierarchical access control for multimedia networks , 2007, Int. J. Secur. Networks.
[53] Panayiotis Kotzanikolaou,et al. Multilayer key establishment for large-scale sensor networks , 2008, Int. J. Secur. Networks.
[54] H. Jonathan Chao,et al. Design and analysis of a multipacket signature detection system , 2007, Int. J. Secur. Networks.
[55] Pieter H. Hartel,et al. Secure pairing with biometrics , 2009, Int. J. Secur. Networks.
[56] Jie Wu,et al. An efficient group key management scheme for mobile ad hoc networks , 2009, Int. J. Secur. Networks.
[57] Mohan S. Kankanhalli,et al. Building trust in peer-to-peer systems: a review , 2006, Int. J. Secur. Networks.
[58] Paul Rabinovich,et al. Secure message delivery in publish/subscribe networks using overlay multicast , 2007, Int. J. Secur. Networks.
[59] Xukai Zou,et al. A novel Conference Key Management solution for Secure Dynamic Conferencing , 2008, Int. J. Secur. Networks.
[60] Michael K. Reiter,et al. Seeing-Is-Believing: using camera phones for human-verifiable authentication , 2009, Int. J. Secur. Networks.
[61] Robert A. Malaney. Securing Wi-Fi networks with position verification: extended version , 2007, Int. J. Secur. Networks.
[62] Li Bai,et al. A Proactive Secret Sharing Scheme in matrix projection method , 2009, Int. J. Secur. Networks.
[63] Xiaoqi Ma,et al. Verifying security protocols by knowledge analysis , 2008, Int. J. Secur. Networks.
[64] C DaltonGeorge,et al. Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees , 2010 .
[65] D Finkelhor,et al. Current information on the scope and nature of child sexual abuse. , 1994, The Future of children.
[66] Sencun Zhu,et al. LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network , 2007, Int. J. Secur. Networks.
[67] Michaël Rusinowitch,et al. Efficient decision tree for protocol analysis in intrusion detection , 2010, Int. J. Secur. Networks.
[68] Adrian Perrig,et al. Designing user studies for security applications: a case study with wireless network configuration , 2009, Int. J. Secur. Networks.
[69] A. Tamilarasi,et al. A backpressure technique for filtering spoofed traffic at upstream routers , 2010, Int. J. Secur. Networks.
[70] Djamel Djenouri,et al. Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks , 2009, Int. J. Secur. Networks.
[71] Panayotis G. Cottis,et al. Overview of satellite communication networks security: introduction of EAP , 2009, Int. J. Secur. Networks.
[72] Chik How Tan,et al. Low-power authenticated group key agreement for heterogeneous wireless networks , 2006, Int. J. Secur. Networks.
[73] Ren-Junn Hwang,et al. An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks , 2010, Int. J. Secur. Networks.
[74] XuLi,et al. Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks , 2010 .
[75] Johnny S. Wong,et al. An agent-based framework for intrusion detection alert verification and event correlation , 2008, Int. J. Secur. Networks.
[76] Yusheng Ji,et al. Secure and efficient data transmission in RFID sensor networks , 2010, Int. J. Secur. Networks.
[77] Robert F. Mills,et al. Using PLSI-U to detect insider threats by datamining e-mail , 2008, Int. J. Secur. Networks.
[78] Weili Wu,et al. Handling inheritance violation for secure interoperation of heterogeneous systems , 2009, Int. J. Secur. Networks.
[79] Mooi Choo Chuah,et al. Syntax vs. semantics: competing approaches to dynamic network intrusion detection , 2008, Int. J. Secur. Networks.
[80] Noureddine Boudriga,et al. Visibility: a novel concept for characterising provable network digital evidences , 2009, Int. J. Secur. Networks.
[81] Riccardo Bettati,et al. Analysis of flow-correlation attacks in anonymity network , 2007, Int. J. Secur. Networks.
[82] Javier Herranz,et al. Aggregate designated verifier signatures and application to secure routing , 2007, Int. J. Secur. Networks.
[83] Fagen Li,et al. ID-based threshold proxy signcryption scheme from bilinear pairings , 2008, Int. J. Secur. Networks.
[84] Shivakant Mishra,et al. Limiting DoS attacks during multihop data delivery in wireless sensor networks , 2006, Int. J. Secur. Networks.
[85] Shiuh-Pyng Shieh,et al. Authentication and secret search mechanisms for RFID-aware wireless sensor networks , 2010, Int. J. Secur. Networks.
[86] Bharat K. Bhargava,et al. Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .
[87] Xiaowen Zhang,et al. Looking at a class of RFID APs through GNY logic , 2010, Int. J. Secur. Networks.
[88] Dijiang Huang. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks , 2007, Int. J. Secur. Networks.
[89] Bo Sheng,et al. Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.
[90] Robert F. Mills,et al. An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols , 2012, Int. J. Secur. Networks.
[91] Li Xu,et al. Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks , 2010, Int. J. Secur. Networks.
[92] Manmeet Mahinderjit Singh,et al. Trust in RFID-enabled Supply-Chain Management , 2010, Int. J. Secur. Networks.
[93] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[94] Yacine Challal,et al. Adaptive clustering for scalable key management in dynamic group communications , 2008, Int. J. Secur. Networks.
[95] L. Schenker,et al. Pushbutton calling with a two-group voice-frequency code , 1960 .
[96] Chuanyi Ji,et al. Optimal worm-scanning method using vulnerable-host distributions , 2007, Int. J. Secur. Networks.
[97] Herman A. Estrin,et al. Teaching In-house Technical Communication Courses , 1983 .
[98] Yu Liu,et al. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.
[99] Jianping Pan,et al. Vulnerabilities in distance-indexed IP traceback schemes , 2007, Int. J. Secur. Networks.
[100] Sukumar Nandi,et al. Secure user-identification and key distribution scheme preserving anonymity , 2008, Int. J. Secur. Networks.
[101] Ding-Zhu Du,et al. An one-way function based framework for pairwise key establishment in sensor networks , 2008, Int. J. Secur. Networks.
[102] Guang Gong,et al. Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks , 2007, Int. J. Secur. Networks.
[103] Matthew K. Franklin,et al. A survey of key evolving cryptosystems , 2006, Int. J. Secur. Networks.
[104] Jie Wu,et al. PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks , 2008, Int. J. Secur. Networks.
[105] Bodo Möller,et al. Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol , 2007, Int. J. Secur. Networks.
[106] Yi Mu,et al. Convertible identity-based anonymous designated ring signatures , 2006, Int. J. Secur. Networks.
[107] Indrajit Ray,et al. Origins: an approach to trace fast spreading worms to their roots , 2008, Int. J. Secur. Networks.
[108] Robert F. Mills,et al. Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees , 2010, Int. J. Secur. Networks.
[109] Joseph B. Evans,et al. Wireless networking security: open issues in trust, management, interoperation and measurement , 2006, Int. J. Secur. Networks.
[110] Mark J. Rodrigues,et al. Perceived barriers to the widespread commercial use of Radio Frequency Identification technology , 2010, Int. J. Secur. Networks.
[111] Vasileios Karyotis,et al. A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks , 2006, Int. J. Secur. Networks.
[112] Chao Chen,et al. On the scalability of Delay-Tolerant Botnets , 2010, Int. J. Secur. Networks.
[113] Ricardo Dahab,et al. On the design of secure protocols for hierarchical sensor networks , 2007, Int. J. Secur. Networks.
[114] Mohamed G. Gouda,et al. Vulnerability analysis of certificate graphs , 2006, Int. J. Secur. Networks.
[115] Qijun Gu,et al. Defence against packet injection in ad hoc networks , 2007, Int. J. Secur. Networks.
[116] Xuemin Shen,et al. A self-encryption authentication protocol for teleconference services , 2006, Int. J. Secur. Networks.
[117] Myung J. Lee,et al. A lightweight encryption and authentication scheme for wireless sensor networks , 2006, Int. J. Secur. Networks.
[118] Michele L. Ybarra,et al. Online "Predators" and Their Victims , 2008 .
[119] Sujeet Shenoi,et al. Forensic analysis of SCADA systems and networks , 2008, Int. J. Secur. Networks.
[120] Robert Moore,et al. Cybercrime: Investigating High-Technology Computer Crime , 2006 .
[121] Claudio Soriente,et al. Using audio in secure device pairing , 2009, Int. J. Secur. Networks.
[122] Sylvie Perreau,et al. Detect DDoS flooding attacks in mobile ad hoc networks , 2010, Int. J. Secur. Networks.
[123] Eyal de Lara,et al. Proximity-based authentication of mobile devices , 2009, Int. J. Secur. Networks.
[124] Chik How Tan,et al. A new signature scheme without random oracles , 2006, Int. J. Secur. Networks.
[125] M. W. Raad. A ubiquitous mobile telemedicine system for the elderly using RFID , 2010, Int. J. Secur. Networks.
[126] Ming-Hour Yang,et al. Lightweight authentication protocol for mobile RFID networks , 2010, Int. J. Secur. Networks.
[127] N. Asokan,et al. Standards for security associations in personal networks: a comparative analysis , 2009, Int. J. Secur. Networks.
[128] Pin-Han Ho,et al. A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks , 2008, Int. J. Secur. Networks.
[129] Leroy McFarlane,et al. An exploration of predatory behaviour in cyberspace: Towards a typology of cyberstalkers , 2003, First Monday.
[130] Nirwan Ansari,et al. Adaptive trust-based anonymous network , 2007, Int. J. Secur. Networks.
[131] Yang Xiao,et al. Attacks and countermeasures in multi-hop Cognitive Radio Networks , 2009, Int. J. Secur. Networks.
[132] Bob Erens,et al. Internet gambling: a secondary analysis of findings from the 2007 British Gambling Prevalence Survey , 2008 .
[133] Zhoujun Li,et al. Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security , 2010, Int. J. Secur. Networks.
[134] Susana Garrido Azevedo,et al. Radio frequency identification: a case study of healthcare organisations , 2010, Int. J. Secur. Networks.
[135] Huaxiong Wang,et al. Efficient multicast stream authentication for the fully adversarial network model , 2007, Int. J. Secur. Networks.
[136] Haiping Xu,et al. Formal modelling and analysis of XML firewall for service-oriented systems , 2008, Int. J. Secur. Networks.