The Social Network Structure of a Computer Hacker Community
暂无分享,去创建一个
[1] Raj Sharman,et al. Handbook of Research on Social and Organizational Liabilities in Information Security , 2008 .
[2] Chandan Mazumdar,et al. A Practical Approach of Fairness in E-Procurement , 2012, Int. J. Inf. Secur. Priv..
[3] Tharam S. Dillon,et al. Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication , 2007, Int. J. Inf. Secur. Priv..
[4] S. E. Kruck,et al. Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use , 2008, Int. J. Inf. Secur. Priv..
[5] Tyrone Grandison,et al. Privacy Protection Issues for Healthcare Wellness Clouds , 2012 .
[6] Jun Zheng,et al. Handbook of Research on Wireless Security , 2008 .
[7] Joel Best,et al. The Social Organization of Deviants , 1980 .
[8] Yun Wang,et al. Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection , 2008 .
[9] Albert Y. Zomaya,et al. Access Control in Wireless Local Area Networks: Fast Authentication Schemes , 2008 .
[10] Social and Human Elements of Information Security: A Case Study , 2009 .
[11] Kathleen M. Carley,et al. Toward an interoperable dynamic network analysis toolkit , 2007, Decis. Support Syst..
[12] Kathleen M. Carley,et al. Revealing Social Structure from Texts: Meta-Matrix Text Analysis as a Novel Method for Network Text Analysis , 2005 .
[13] George Yee. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards , 2011 .
[14] Bernardo Magnini,et al. A WordNet-Based Approach to Named Entites Recognition , 2022 .
[15] Jyh-haw Yeh,et al. Security Issues and Possible Countermeasures for a Mobile Agent Based M-Commerce Application , 2005 .
[16] Hamid R. Nemati. International Journal of Information Security and Privacy , 2007 .