Cybercrime: Dissecting the State of Underground Enterprise
暂无分享,去创建一个
[1] Yi-Chun Yeh,et al. BrowserGuard: A Behavior-Based Solution to Drive-by-Download Attacks , 2011, IEEE Journal on Selected Areas in Communications.
[2] Vern Paxson,et al. Measuring Pay-per-Install: The Commoditization of Malware Distribution , 2011, USENIX Security Symposium.
[3] Theodore H. Clark,et al. A comparative study of reported and unreported computer crimes , 2000 .
[4] Qishi Wu,et al. AVOIDIT: A Cyber Attack Taxonomy , 2009 .
[5] Christopher Krügel,et al. Peering through the iframe , 2011, 2011 Proceedings IEEE INFOCOM.
[6] R. Clandos. Eye on cybercrime , 2003, IEEE Security & Privacy Magazine.
[7] Carolyn P. Meinel. Cybercrime Treaty could chill research , 2004, IEEE Security & Privacy Magazine.
[8] Volker Springel. Into the darkness , 2007, Nature.
[9] Richard J. Enbody,et al. A BROWSER MALWARE TAXONOMY , 2011 .