Security, cybercrime, and scale

Defense begins by identifying the targets likely to yield the greatest reward for an attacker's investment.

[1]  Tyler Moore,et al.  Measuring the Cost of Cybercrime , 2012, WEIS.

[2]  Cormac Herley,et al.  Is Everything We Know about Password Stealing Wrong? , 2012, IEEE Security & Privacy.

[3]  F. Schneider Blueprint for a Science of Cybersecurity , 2011 .

[4]  Cormac Herley,et al.  Why do Nigerian Scammers Say They are From Nigeria? , 2012, WEIS.

[5]  Butler W. Lampson,et al.  Usable Security: How to Get It , 2009 .

[6]  Moni Naor,et al.  Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.

[7]  L Graff,et al.  False-negative and false-positive errors in abdominal pain evaluation: failure to diagnose acute appendicitis and unnecessary surgery. , 2000, Academic emergency medicine : official journal of the Society for Academic Emergency Medicine.

[8]  Harry L. Van Trees,et al.  Detection, Estimation, and Modulation Theory, Part I , 1968 .

[9]  Cormac Herley,et al.  The Plight of the Targeted Attacker in a World of Scale , 2010, WEIS.

[10]  William L. Simon,et al.  The Art of Deception: Controlling the Human Element of Security , 2001 .

[11]  Chris Kanich,et al.  Show Me the Money: Characterizing Spam-advertised Revenue , 2011, USENIX Security Symposium.

[12]  Jeffrey Barlow,et al.  The Art of Deception, Controlling the Human Element of Security , 2003 .

[13]  Vern Paxson,et al.  Measuring Pay-per-Install: The Commoditization of Malware Distribution , 2011, USENIX Security Symposium.

[14]  Cormac Herley,et al.  Sex, Lies and Cyber-Crime Surveys , 2011, WEIS.

[15]  J. Weatherwax,et al.  Solutions to Selected Problems In : Detection , Estimation , and Modulation Theory : Part I , 2014 .

[16]  Jonathan M. Smith,et al.  USENIX Association , 2000 .

[17]  J. Elmore,et al.  Ten-year risk of false positive screening mammograms and clinical breast examinations. , 1998, The New England journal of medicine.

[18]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[19]  Butler W. Lampson Privacy and securityUsable security , 2009, Commun. ACM.