Security, cybercrime, and scale
暂无分享,去创建一个
[1] Tyler Moore,et al. Measuring the Cost of Cybercrime , 2012, WEIS.
[2] Cormac Herley,et al. Is Everything We Know about Password Stealing Wrong? , 2012, IEEE Security & Privacy.
[3] F. Schneider. Blueprint for a Science of Cybersecurity , 2011 .
[4] Cormac Herley,et al. Why do Nigerian Scammers Say They are From Nigeria? , 2012, WEIS.
[5] Butler W. Lampson,et al. Usable Security: How to Get It , 2009 .
[6] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[7] L Graff,et al. False-negative and false-positive errors in abdominal pain evaluation: failure to diagnose acute appendicitis and unnecessary surgery. , 2000, Academic emergency medicine : official journal of the Society for Academic Emergency Medicine.
[8] Harry L. Van Trees,et al. Detection, Estimation, and Modulation Theory, Part I , 1968 .
[9] Cormac Herley,et al. The Plight of the Targeted Attacker in a World of Scale , 2010, WEIS.
[10] William L. Simon,et al. The Art of Deception: Controlling the Human Element of Security , 2001 .
[11] Chris Kanich,et al. Show Me the Money: Characterizing Spam-advertised Revenue , 2011, USENIX Security Symposium.
[12] Jeffrey Barlow,et al. The Art of Deception, Controlling the Human Element of Security , 2003 .
[13] Vern Paxson,et al. Measuring Pay-per-Install: The Commoditization of Malware Distribution , 2011, USENIX Security Symposium.
[14] Cormac Herley,et al. Sex, Lies and Cyber-Crime Surveys , 2011, WEIS.
[15] J. Weatherwax,et al. Solutions to Selected Problems In : Detection , Estimation , and Modulation Theory : Part I , 2014 .
[16] Jonathan M. Smith,et al. USENIX Association , 2000 .
[17] J. Elmore,et al. Ten-year risk of false positive screening mammograms and clinical breast examinations. , 1998, The New England journal of medicine.
[18] Charles P. Pfleeger,et al. Security in computing , 1988 .
[19] Butler W. Lampson. Privacy and securityUsable security , 2009, Commun. ACM.