A comparative study of cyberattacks
暂无分享,去创建一个
[1] Qiu-Hong Wang,et al. The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[2] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[3] Ross J. Anderson,et al. The Economics of Online Crime , 2009 .
[4] Craig A. Shue,et al. Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems , 2010, 2010 Proceedings IEEE INFOCOM.
[5] B. McCarthy. NEW ECONOMICS OF SOCIOLOGICAL CRIMINOLOGY , 2002 .
[6] Kevin C. Almeroth,et al. FIRE: FInding Rogue nEtworks , 2009, 2009 Annual Computer Security Applications Conference.
[7] Xingan Li,et al. International Actions against Cybercrime: Networking Legal Systems in the Networked Crime Scene , 2007, Webology.
[8] Ivan P. L. Png,et al. Information Security: Facilitating User Precautions Vis-à-Vis Enforcement Against Attackers , 2009, J. Manag. Inf. Syst..
[9] Ivan P. L. Png,et al. The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence , 2008 .
[10] Tom DeMarco,et al. Controlling software projects : management, measurement & estimation , 1982 .