The Evolution of Cybercrime, 2004-2014
暂无分享,去创建一个
[1] T. Holt. Examining the Forces Shaping Cybercrime Markets Online , 2013 .
[2] Ronaldo M. Salles,et al. Botnets: A survey , 2013, Comput. Networks.
[3] Carlo Morselli,et al. Inside Criminal Networks , 2008 .
[4] C. Stoll. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .
[5] M. Soudijn,et al. Cybercrime and virtual offender convergence settings , 2012, Trends in Organized Crime.
[6] Mary Gail Frawley-O'Dea,et al. Who's Doing What to Whom? , 1997 .
[7] William C. Ashmore. Impact of Alleged Russian Cyber Attacks , 2009 .
[8] Richard Jones. Crime in the Digital Age , 2003, Int. J. Law Inf. Technol..
[9] L. Demause,et al. Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power , 2013 .
[10] Gary Stix,et al. Fighting Future Wars , 1995 .
[11] J. Wolpaw,et al. Brain-Computer Interfaces: Principles and Practice , 2012 .
[12] Benoit Dupont. Cybersecurity Futures: How Can We Regulate Emergent Risks? , 2013 .
[14] Rajesh P. N. Rao. Brain-Computer Interfacing: An Introduction , 2010 .
[15] Jim Giles. Scareware: the inside story , 2010 .
[16] Michael Stohl. Dr. Strangeweb: Or How They Stopped Worrying and Learned to Love Cyber War , 2014 .
[17] Clive Davidson,et al. Cyberpunk: Outlaws and hackers on the computer frontier , 1992 .
[18] Paul A. Watters,et al. Cybercrime: The Case of Obfuscated Malware , 2011, ICGS3/e-Democracy.
[19] Parmy Olson. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency , 2012 .
[20] Janice C. Sipior,et al. Unintended invitation: organizational wi-fi use by external roaming users , 2007, CACM.
[21] Misha Glenny,et al. DarkMarket: Cyberthieves, Cybercops and You , 2011 .