-
1
-
-
34147100405
-
-
AOL/NCSA, Online Safety Study, Produced by America Online and the National Cyber Security Association, 2005; http://www.staysafeonline.org/ pdf/safety_study_2005.pdf.
-
AOL/NCSA, Online Safety Study, Produced by America Online and the National Cyber Security Association, 2005; http://www.staysafeonline.org/ pdf/safety_study_2005.pdf.
-
-
-
-
3
-
-
34147124004
-
-
S. Berinato, Patch and pray, CSO Magazine, Aug. 2003; http://www.csoonline.com/read/080103/patch.html.
-
S. Berinato, "Patch and pray," CSO Magazine, Aug. 2003; http://www.csoonline.com/read/080103/patch.html.
-
-
-
-
7
-
-
78751556270
-
Emerging issues in responsible vulnerability disclosure
-
presented at, Cambridge, MA
-
H. Cavusoglu, H. Cavusoglu, and S, Raghunathan, "Emerging issues in responsible vulnerability disclosure," presented at Workshop on the Economics of Information Security (WEIS05), Cambridge, MA, 2005.
-
(2005)
Workshop on the Economics of Information Security (WEIS05)
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Raghunathan, S.3
-
10
-
-
34147115964
-
Microsoft ponders automatic patching
-
Aug. 22
-
J. Evers, "Microsoft ponders automatic patching," InfoWorld/IDG News Service, Aug. 22, 2003; http://www.infoworld.com/article/03/08/22/HNautopatch_1.html.
-
(2003)
InfoWorld/IDG News Service
-
-
Evers, J.1
-
11
-
-
34147152044
-
Faking it: Criminal sanctions and the cost of computer intrusions
-
presented at, Cambridge, MA
-
J. Granick, "Faking it: Criminal sanctions and the cost of computer intrusions," presented at Workshop on the Economics of Information Security (WEIS05), Cambridge, MA, 2005.
-
(2005)
Workshop on the Economics of Information Security (WEIS05)
-
-
Granick, J.1
-
13
-
-
34147187550
-
-
M. Kotadia, Windows Update flaw 'left PCs open' to MSBlast, ZDNet UK, Aug. 15, 2003; http://news.zdnet.co.uk/software/windows/ 0,39020396,39115732,00.html
-
M. Kotadia, "Windows Update flaw 'left PCs open' to MSBlast," ZDNet UK, Aug. 15, 2003; http://news.zdnet.co.uk/software/windows/ 0,39020396,39115732,00.html
-
-
-
-
14
-
-
34748865901
-
Invasion of the computer snatchers
-
Feb. 19
-
B. Krebs, "Invasion of the computer snatchers," Washington Post Mag., Feb. 19, 2006; http://www.washingtonpost.com/wp-dyn/content/ article/2006/02/14/AR2006021401342.html.
-
(2006)
Washington Post Mag
-
-
Krebs, B.1
-
15
-
-
0028514027
-
A taxonomy of computer program security flaws, with examples
-
C.E. Landwehr, A.R. Bull et al., "A taxonomy of computer program security flaws, with examples," ACM Computing Surveys, vol. 26, no. 3, 1994.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
-
-
Landwehr, C.E.1
Bull, A.R.2
-
16
-
-
34147153081
-
Good worm, new bug mean double trouble
-
Aug. 19, Good+worm,+new+bug+mean+double+trouble/2100-1002_3-5065644.html
-
R. Lemos, "Good worm, new bug mean double trouble," CNET News.com Aug. 19, 2003; http://news.com.com/ Good+worm,+new+bug+mean+double+trouble/2100-1002_3-5065644.html.
-
(2003)
CNET News.com
-
-
Lemos, R.1
-
18
-
-
4344608055
-
Approaching zero
-
E. Levy, "Approaching zero," IEEE Security and Privacy, vol. 2, no. 4, pp. 65-66, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.4
, pp. 65-66
-
-
Levy, E.1
-
19
-
-
34147139215
-
MS Windows Update site falls to Code Red
-
Sept
-
J. Leydon, "MS Windows Update site falls to Code Red," Security Focus, Sept. 2001.
-
(2001)
Security Focus
-
-
Leydon, J.1
-
20
-
-
0035639140
-
Birds of a feather: Homophily in social networks
-
M. McPherson, L. Smith-Lovin, and J.M. Cook, "Birds of a feather: Homophily in social networks." Annual Rev. of Sociology, vol. 27, no. 3, 2001.
-
(2001)
Annual Rev. of Sociology
, vol.27
, Issue.3
-
-
McPherson, M.1
Smith-Lovin, L.2
Cook, J.M.3
-
21
-
-
0742276097
-
Inside the slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the slammer worm," IEEE Security and Privacy, vol. 1, no. 4, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
24
-
-
34147183073
-
-
SANS Institute
-
SANS Institute, "Survival Time History," 2004; http://isc.sans.org/survivalhistory.php.
-
(2004)
Survival Time History
-
-
-
27
-
-
58049152987
-
Impact of software vulnerability announcements on the market value of software vendors - An empirical investigation
-
presented at, Cambridge, MA
-
R. Telang and S. Wattal, "Impact of software vulnerability announcements on the market value of software vendors - An empirical investigation," presented at Workshop on the Economics of Information Security (WEIS05), Cambridge, MA, 2005.
-
(2005)
Workshop on the Economics of Information Security (WEIS05)
-
-
Telang, R.1
Wattal, S.2
-
28
-
-
34147184982
-
System reliability and free riding
-
N. Sadeh, Ed, New York, NY
-
H. Varian, "System reliability and free riding," N. Sadeh, Ed., in Proc. the Workshop on Internet Computing and E-Commerce (ICEC2003), New York, NY: 2003.
-
(2003)
Proc. the Workshop on Internet Computing and E-Commerce (ICEC2003)
-
-
Varian, H.1
-
29
-
-
0004568554
-
A review of port scanning techniques
-
M. de Vivo, E. Carrasco, G. Isern, and G.O. de Vivo, "A review of port scanning techniques," ACM SIGCOMM Computer Communications Rev., vol. 2, pp. 41-48, 1999.
-
(1999)
ACM SIGCOMM Computer Communications Rev
, vol.2
, pp. 41-48
-
-
de Vivo, M.1
Carrasco, E.2
Isern, G.3
de Vivo, G.O.4
-
30
-
-
8644279145
-
Large scale malicious code: A research agenda
-
Tech. Rep, DARPA sponsored report, 2003
-
N. Weaver, V.Paxson, S. Staniford, and R. Cunningham, "Large scale malicious code: A research agenda," Tech. Rep., DARPA sponsored report, 2003.
-
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
31
-
-
84937387908
-
The networked nature of community online and offline
-
B. Wellman, J. Boase, and W. Chen, "The networked nature of community online and offline," IT & Society, vol. 1, no. 1, 2002.
-
(2002)
IT & Society
, vol.1
, Issue.1
-
-
Wellman, B.1
Boase, J.2
Chen, W.3
-
33
-
-
21644488742
-
Maintaining perspective on who is the enemy in the security systems administration of computer networks
-
presented at, Fort Lauderdale, FL
-
W. Yurcik, J. Barlow, and J. Rosendale, "Maintaining perspective on who is the enemy in the security systems administration of computer networks," presented at ACM CHI Workshop on System Administrators Are Users, Too: Designing Workspaces for Managing Internet-Scale Systems, Fort Lauderdale, FL, 2003.
-
(2003)
ACM CHI Workshop on System Administrators Are Users, Too: Designing Workspaces for Managing Internet-Scale Systems
-
-
Yurcik, W.1
Barlow, J.2
Rosendale, J.3
|