Advances in Cyber Security
暂无分享,去创建一个
[1] Stefan Savage,et al. Privacy-preserving network forensics , 2011, Commun. ACM.
[2] Sergey Yekhanin,et al. Private information retrieval , 2010, CACM.
[3] David Alan Grier. Not for All Markets , 2011, Computer.
[4] Jon Kleinberg,et al. Authoritative sources in a hyperlinked environment , 1999, SODA '98.
[5] Ari Schwartz,et al. Identity management and privacy , 2011, Commun. ACM.
[6] J. Coleman. Foundations of Social Theory , 1990 .
[7] D. Frank Hsu,et al. Combinatorial Fusion Analysis: Methods and Practices of Combining Multiple Scoring Systems , 2006 .
[8] Albert-László Barabási,et al. Controllability of complex networks , 2011, Nature.
[9] P. Pin,et al. Marginal contribution, reciprocity and equity in segregated groups: Bounded rationality and self-organization in social networks , 2007 .
[10] Salvatore J. Stolfo,et al. Anomaly Detection in Computer Security and an Application to File System Accesses , 2005, ISMIS.
[11] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[12] Xiaofan Wang,et al. Evolution of a large online social network , 2009 .
[13] Martin Hilbert,et al. The World’s Technological Capacity to Store, Communicate, and Compute Information , 2011, Science.
[14] Aleksandar Ivanov,et al. Using Prediction Markets to Harness Collective Wisdom for Forecasting , 2009 .
[15] Paloma Martínez,et al. Toward an Equal Opportunity Web: Applications, Standards, and Tools that Increase Accessibility , 2011, Computer.
[16] Gregory Goth,et al. Turning data into knowledge , 2010, Commun. ACM.
[17] Jeffrey M. Voas,et al. In Trust We Trust , 2010, Computer.
[18] Jacob West,et al. Secure Programming with Static Analysis , 2007 .
[19] Avi Goldfarb,et al. Online advertising, behavioral targeting, and privacy , 2011, Commun. ACM.
[20] Moises Sudit,et al. Cyber attack modeling and simulation for network security analysis , 2007, 2007 Winter Simulation Conference.
[21] H. S. Kim,et al. Commercial Antivirus Software Effectiveness: An Empirical Study , 2011, Computer.
[22] Tim Bass,et al. Intrusion detection systems and multisensor data fusion , 2000, CACM.
[23] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[24] Dennis J. McFarland,et al. Brain–computer interfaces for communication and control , 2002, Clinical Neurophysiology.
[25] Richard A. Clarke,et al. Cyber War: The Next Threat to National Security and What to Do About It , 2010 .
[26] Mark Mohammad Tehranipoor,et al. Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.
[27] I. Bremmer. Democracy in Cyberspace , 2010, Coding Democracy.
[28] Kimberly Peretti. Data Breaches: What the Underground World of Carding Reveals , 2009 .
[29] Vassilis Kostakos,et al. Inferring social networks from physical interactions: a feasibility study , 2010, Int. J. Pervasive Comput. Commun..
[30] Sharon L. Milgram,et al. The Small World Problem , 1967 .
[31] J.D. Day,et al. The OSI reference model , 1983 .
[32] Samuel Greengard,et al. Social games, virtual goods , 2011, Commun. ACM.
[33] A. van de Rijt,et al. Dynamics of Networks if Everyone Strives for Structural Holes1 , 2008, American Journal of Sociology.
[34] José Luis Gómez Barroso,et al. Asymmetries and shortages of the network neutrality principle , 2011, CACM.
[35] Ruby B. Lee,et al. New cache designs for thwarting software cache-based side channel attacks , 2007, ISCA '07.
[36] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[37] V. Buskens,et al. Embedded trust: Control and learning , 2002 .
[38] Alex Wright,et al. Web science meets network science , 2011, Commun. ACM.
[39] David B. Johnson. Scalable support for transparent mobile host internetworking , 1995, Wirel. Networks.
[40] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[41] Monya Baker,et al. From promising to practical: tools to study networks of neurons , 2010, Nature Methods.
[42] N. Lin. SOCIAL NETWORKS AND STATUS ATTAINMENT , 1999 .
[43] Soumitra Dutta,et al. What's your personal social media strategy? , 2010, Harvard business review.
[44] Tommi Mikkonen,et al. Reports of the Web's Death Are Greatly Exaggerated , 2011, Computer.
[45] Dennis P. Groth,et al. Why an informatics degree? , 2010, Commun. ACM.
[46] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994 .
[47] Joel F. Brenner. Why isn't cyberspace more secure? , 2010, Commun. ACM.
[48] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[49] Gang Wang,et al. Crime data mining: a general framework and some examples , 2004, Computer.
[50] Gary Anthes,et al. Security in the cloud , 2010, Commun. ACM.
[51] Edward R. Tufte,et al. Envisioning Information , 1990 .
[52] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[53] I. N. A. C. I. J. H. Fowler. Book Review: Connected: The surprising power of our social networks and how they shape our lives. , 2009 .
[54] Marcel Fafchamps,et al. The formation of risk sharing networks , 2007 .
[55] Matt Welsh,et al. Sensor networks for the sciences , 2010, Commun. ACM.
[56] Ruby B. Lee,et al. Hardware-rooted trust for secure key management and transient trust , 2007, CCS '07.