Survey of Non-malicious User Actions that Introduce Network and System Vulnerabilities and Exploits
暂无分享,去创建一个
[1] Sonia Chiasson,et al. Why phishing still works: User strategies for combating phishing attacks , 2015, Int. J. Hum. Comput. Stud..
[2] Raymond Gozzi. A Brief History of Internet Time , 2002 .
[3] Adrienne Porter Felt,et al. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness , 2013, USENIX Security Symposium.
[4] Adrian Perrig,et al. Phoolproof Phishing Prevention , 2006, Financial Cryptography.
[5] 윤한수,et al. 초소형 Telemetry 개발 , 2011 .
[6] Ray Hunt,et al. A taxonomy of network and computer attacks , 2005, Comput. Secur..
[7] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[8] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[9] Lorrie Faith Cranor,et al. Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.
[10] Vinton G. Cerf,et al. A brief history of the internet , 1999, CCRV.
[11] Laura A. Dabbish,et al. "My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security , 2015, SOUPS.
[12] Shudong Zhou. Virtual networking , 2010, OPSR.