Virtual Worlds and Fraud: Approaching Cybersecurity in Massively Multiplayer Online Games
暂无分享,去创建一个
Markus Jakobsson | Shaowen Bardzell | Jeffrey Bardzell | William Odom | Tyler Pace | Aaron R. Houssian
[1] Dan Kaminsky. Explorations in namespace , 2006, CACM.
[2] Philippe Golle,et al. Preventing bots from playing online games , 2005, CIE.
[3] Hao Wang,et al. FreeRank: implementing independent ranking service for multiplayer online games , 2005, NetGames '05.
[4] Aurobindo Sundaram,et al. An introduction to intrusion detection , 1996, CROS.
[5] Clara Fernández-Vara,et al. Towards an Ontological Language for Game Analysis , 2005, DiGRA Conference.
[6] Timo Kaukoranta,et al. Towards a Definition of a Computer Game , 2003 .
[7] Robert Alan Brookey,et al. Restricted Play , 2006, Games Cult..
[8] Chin-Laung Lei,et al. Identifying MMORPG Bots: A Traffic Analysis Approach , 2009, EURASIP J. Adv. Signal Process..
[9] Espen Aarseth. Genre trouble : narrativism and the art of simulation , 2004 .
[10] Sergio Caltagirone,et al. Architecture for a massively multiplayer online role playing game engine , 2002 .
[11] Sherry B. Ortner,et al. Culture/power/history : a reader in contemporary social theory , 1994 .
[12] Daniel Zappala,et al. Low latency and cheat-proof event ordering for peer-to-peer games , 2004, NOSSDAV '04.
[13] Ronggong Song,et al. Online Gaming Crime and Security Issue - Cases and Countermeasures from Taiwan , 2004, PST.
[14] Sebastian Zander,et al. Achieving fairness in multiplayer network games through automated latency balancing , 2005, ACE '05.
[15] Kang Li,et al. Analysis of state exposure control to prevent cheating in online games , 2004, NOSSDAV '04.
[16] Alejandro P. Buchmann,et al. Addressing cheating in distributed MMOGs , 2005, NetGames '05.
[17] Muthucumaru Maheswaran,et al. A cheat controlled protocol for centralized online multiplayer games , 2004, NetGames '04.
[18] Thomas M. Malaby. Parlaying Value , 2006, Games Cult..
[19] Edward Castronova,et al. Virtual Worlds: A First-Hand Account of Market and Society on the Cyberian Frontier , 2001, SSRN Electronic Journal.
[20] Kymie M. C. Tan,et al. Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits , 2002, RAID.
[21] Stéphane Natkin,et al. Proceedings of the 2006 ACM SIGCHI international conference on Advances in computer entertainment technology , 2005 .
[22] Brian Randell,et al. A systematic classification of cheating in online games , 2005, NetGames '05.
[23] Markus Jakobsson,et al. Drive-By Pharming , 2007, ICICS.