Exploring a Warrior Paradigm to Design Out Cybercrime
暂无分享,去创建一个
[1] Bert-Jaap Koops. De dynamiek van cybercrimewetgeving in Europa en Nederland , 2012 .
[2] Chandan Mazumdar,et al. A novel approach to collaborative security using attack graph , 2011, 2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application.
[3] Gang Liu,et al. Smartening the crowds: computational techniques for improving human verification to fight phishing scams , 2011, SOUPS.
[4] Gerald Friedland,et al. Sherlock holmes' evil twin: on the impact of global inference for online privacy , 2011, NSPW '11.
[5] Pieter H. Hartel,et al. Cyber-crime Science = Crime Science + Information Security , 2010 .
[6] Lawrence Lessig. Privacy as Property , 2015 .
[7] Clifford Goodman. Netherlands Organization for Applied Scientific Research Medical Technology Unit (Tno) , 1988 .
[8] Frans L. Leeuw,et al. Cyber society and digital policies: Challenges to evaluation? 1 , 2012 .
[9] P. Conradie,et al. Rotterdam open data: Exploring the release of Public Sector Information through co-creation , 2012, 2012 18th International ICE Conference on Engineering, Technology and Innovation.
[10] D. Sculley,et al. Meaning and mining: the impact of implicit assumptions in data mining for the humanities , 2008, Lit. Linguistic Comput..
[11] Balachander Krishnamurthy,et al. WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Privacy Diffusion on the Web: A Longitudinal Perspective , 2022 .
[12] Sicco Verwer,et al. Combining and Analyzing Judicial Databases , 2013, Discrimination and Privacy in the Information Society.
[13] Jonathan Clough 1. Cybercrime , 2011 .