Guest editorial: research framework for AIS grand vision of the bright ICT initiative
暂无分享,去创建一个
[1] Nicholas Hopper,et al. Selectively Traceable Anonymity , 2006, Privacy Enhancing Technologies.
[2] Saul Levmore,et al. The Offensive Internet: Speech, Privacy, and Reputation , 2011 .
[3] Shigeyuki Matsuda,et al. Tracing Network Attacks to Their Sources , 2002, IEEE Internet Comput..
[4] Chey Cobb. Network Security For Dummies , 2002 .
[5] David H. Reiley,et al. The Economics of Spam , 2012 .
[6] P. W. Singer,et al. Cybersecurity and Cyberwar: What Everyone Needs to Know® , 2013 .
[7] Robert O'Harrow,et al. No place to hide , 1997, Science.
[8] Terence Craig,et al. Privacy and Big Data , 2011 .
[9] Chae Sub Lee,et al. Realization of the next-generation network , 2005, IEEE Communications Magazine.
[10] Rik Farrow. Interview with Stefan Savage: On the Spam Payment Trail , 2011, login Usenix Mag..
[11] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[12] Adam Stotz,et al. INformation fusion engine for real-time decision-making (INFERD): A perceptual system for cyber attack tracking , 2007, 2007 10th International Conference on Information Fusion.
[13] Wookeun Bae,et al. A Comparative Study on the Waste Electrical and Electronic Equipment (WEEE) Recycling Policies of the European Union and the Republic of Korea , 2015 .
[14] Christopher Krügel,et al. A Practical Attack to De-anonymize Social Network Users , 2010, 2010 IEEE Symposium on Security and Privacy.
[15] S. Perren,et al. Is Cyberbullying Worse than Traditional Bullying? Examining the Differential Roles of Medium, Publicity, and Anonymity for the Perceived Severity of Bullying , 2012, Journal of Youth and Adolescence.