An inquiry into the nature and causes of the wealth of internet miscreants
暂无分享,去创建一个
Stefan Savage | Vern Paxson | Adrian Perrig | Jason Franklin | V. Paxson | S. Savage | Jason Franklin | A. Perrig
[1] Mike St. Johns. Identification Protocol , 1993, RFC.
[2] Jarkko Oikarinen,et al. Internet Relay Chat Protocol , 1993, RFC.
[3] Nello Cristianini,et al. Advances in Kernel Methods - Support Vector Learning , 1999 .
[4] Yiming Yang,et al. A re-examination of text categorization methods , 1999, SIGIR '99.
[5] Ross J. Anderson. Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.
[6] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[7] J. Stiglitz. The market for 'lemons': quality uncertainty and the market mechanism , 2002 .
[8] Stuart E. Schechter,et al. Quantitatively Differentiating System Security , 2002 .
[9] O. Assis,et al. Towards Better Definitions and Measures of Internet Security , 2003 .
[10] A. Ozment,et al. Bug Auctions: Vulnerability Markets Reconsidered , 2004 .
[11] Stuart E. Schechter. Toward econometric models of the security risk from remote attacks , 2005, IEEE Security & Privacy.
[12] Paul N. Bennett,et al. Feature Representation for Effective Action-Item Detection , 2005 .
[13] Lorrie Faith Cranor,et al. The Real ID Act: Fixing Identity Documents with Duct Tape , 2006 .
[14] Rob Thomas,et al. The underground economy: priceless , 2006 .
[15] Phillip B. Gibbons,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2006, IEEE/ACM Transactions on Networking.