-
2
-
-
38149073177
-
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories
-
November
-
Gandhi, M., Jakobsson, M., Ratkiewicz, J.: Badvertisements: Stealthy Click-Fraud with Unwitting Accessories. Anti-Phishing and Online Fraud, Part I Journal of Digital Forensic Practice 1(2) (November 2006)
-
(2006)
Anti-Phishing and Online Fraud, Part I Journal of Digital Forensic Practice
, vol.1
, Issue.2
-
-
Gandhi, M.1
Jakobsson, M.2
Ratkiewicz, J.3
-
5
-
-
38549139786
-
Drive-By Pharming
-
December 13
-
Stamm, S., Ramzan, Z., Jakobsson, M.: Drive-By Pharming, Indiana University Computer Science Technical Report 641 (December 13, 2006)
-
(2006)
Indiana University Computer Science Technical Report
, vol.641
-
-
Stamm, S.1
Ramzan, Z.2
Jakobsson, M.3
-
7
-
-
34547381072
-
Puppetnets: Misusing web browsers as a distributed attack infrastructure
-
ACM Press, New York
-
Lam, V.T., Antonatos, S., Akritidis, P., Anagnostakis, K.G.: Puppetnets: misusing web browsers as a distributed attack infrastructure, In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), ACM Press, New York (2006)
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS
-
-
Lam, V.T.1
Antonatos, S.2
Akritidis, P.3
Anagnostakis, K.G.4
-
8
-
-
33749635619
-
-
Pew Internet and American Life Project Memo April 26
-
Madden, M.: Internet Penetration and Impact. Pew Internet and American Life Project Memo (April 26, 2006), http://www.pewinternet.org/PPF/r/182/report. display.asp
-
(2006)
Internet Penetration and Impact
-
-
Madden, M.1
-
9
-
-
0031140709
-
Internet security: Firewalls and beyond
-
Oppliger, R.: Internet security: firewalls and beyond. Communications of the ACM 40(5), 92-102 (1997)
-
(1997)
Communications of the ACM
, vol.40
, Issue.5
, pp. 92-102
-
-
Oppliger, R.1
-
11
-
-
46049100524
-
-
Routers. The Journal of Digital Forensic Practice
-
Tsow, A., Jakobsson, M., Yang, L., Wetzel, S.: Warkitting: the Drive-by Subversion of Wireless Home Routers. The Journal of Digital Forensic Practice (2006)
-
(2006)
Warkitting: The Drive-by Subversion of Wireless Home
-
-
Tsow, A.1
Jakobsson, M.2
Yang, L.3
Wetzel, S.4
-
12
-
-
38149037837
-
-
Violino, B.: After Phishing? Pharming! CSO Magazine (October 2005), http://www.csoonline.com/read/100105/pharm.html
-
Violino, B.: After Phishing? Pharming! CSO Magazine (October 2005), http://www.csoonline.com/read/100105/pharm.html
-
-
-
-
14
-
-
38149067404
-
-
Survey Reveals the Majority of U.S. Adult Computer Users Are Unprotected from Malware, ESET software press release July 17
-
Survey Reveals the Majority of U.S. Adult Computer Users Are Unprotected from Malware, ESET software press release (July 17, 2006), http ://eset.com/company/article.php?contentID1553
-
(2006)
-
-
-
16
-
-
38149050487
-
Microsoft says Half of Windows Computers Have Trojans
-
October 26
-
Microsoft says Half of Windows Computers Have Trojans, Internet News (October 26, 2006), http://www.internetnews.com/security/article.php/3640216
-
(2006)
Internet News
-
-
-
18
-
-
38149001484
-
-
The Symantec Internet Security Threat Report, Symantec Corporation, September
-
The Symantec Internet Security Threat Report, Symantec Corporation, vol. 10 (September 2006), http://www.Symantec.com/enterprise/threatreport/index.jsp
-
(2006)
, vol.10
-
-
|