-
3
-
-
63349105002
-
-
PandaLabs. Quarterly Report PandaLabs. 2007 July 15, 2007 [cited 2007 12 September]; April-June 2007:[Available from: http://www.pandasecurity. com/.
-
PandaLabs. Quarterly Report PandaLabs. 2007 July 15, 2007 [cited 2007 12 September]; April-June 2007:[Available from: http://www.pandasecurity. com/.
-
-
-
-
5
-
-
84869263981
-
-
Finjan Inc, cited 2006 September 20, Available from
-
Finjan Inc. Web Security Trends Report. 2006 [cited 2006 September 20]; Available from: http://www.finjan.com/Content.aspx?id=827.
-
(2006)
Web Security Trends Report
-
-
-
6
-
-
63349105489
-
The Black Market: A Study of White Collar Crime
-
New Jersey: Patterson Smith
-
Clinard, M.B., The Black Market: A Study of White Collar Crime. 1969, Montclair, New Jersey: Patterson Smith.
-
(1969)
Montclair
-
-
Clinard, M.B.1
-
9
-
-
33746613622
-
A Comparison of Market Approaches to Software Vulnerability Disclosure. In International Conference, ETRICS 2006
-
Freiburg, Germany: Springer-Verlag Berlin Heidelberg
-
Böhme, R. A Comparison of Market Approaches to Software Vulnerability Disclosure. In International Conference, ETRICS 2006, LNCS 3995 2006. Freiburg, Germany: Springer-Verlag Berlin Heidelberg.
-
(2006)
LNCS
, vol.3995
-
-
Böhme, R.1
-
12
-
-
84869264741
-
-
Naraine, R. Researcher: WMF Exploit Sold Underground for $4,000 2006 [cited 2007 September 15]; Available from: http://www.eweek.com/article2/0,1895,1918198,00.asp.
-
Naraine, R. Researcher: WMF Exploit Sold Underground for $4,000 2006 [cited 2007 September 15]; Available from: http://www.eweek.com/article2/0,1895,1918198,00.asp.
-
-
-
-
13
-
-
63349112359
-
-
Naraine, R. Hackers Selling Vista Zero-Day Exploit. 2006 [cited 2007 June 2]; Available from: http://www.eweek.com/ print-article2/0,1217,a= 196573,00.asp.
-
Naraine, R. Hackers Selling Vista Zero-Day Exploit. 2006 [cited 2007 June 2]; Available from: http://www.eweek.com/ print-article2/0,1217,a= 196573,00.asp.
-
-
-
-
14
-
-
63349103849
-
-
Naraine, R. Price War: iDefense Doubles Bounty for Security Flaws 2005 [cited 2007 April 28]; Available from: http://www.eweek.com/article2/0, 1895,1841268,00.asp.
-
Naraine, R. Price War: iDefense Doubles Bounty for Security Flaws 2005 [cited 2007 April 28]; Available from: http://www.eweek.com/article2/0, 1895,1841268,00.asp.
-
-
-
-
15
-
-
39749101467
-
How to Buy Better Testing: Using Competition to Get The Most Security and Robustness for Your Dollar
-
Bristol, UK
-
Schechter, S. How to Buy Better Testing: Using Competition to Get The Most Security and Robustness for Your Dollar. In Infrastructures Security Conference. 2002. Bristol, UK.
-
(2002)
Infrastructures Security Conference
-
-
Schechter, S.1
-
16
-
-
84869266995
-
Threats for $ale
-
cited 2006 August 4, Available from
-
Kaplan, D. Threats for $ale. SC Magazine 2006 [cited 2006 August 4]; Available from: www.scmagazine.com/us/news/ article/556843/threats- ale/.
-
(2006)
SC Magazine
-
-
Kaplan, D.1
-
18
-
-
63349104999
-
-
Zhuge, J., et al. Studying Malicious Websites and the Underground Economy on the Chinese Website. Honeyblog 2007 [cited 2008 February 25]; Available from: http://honeyblog.org/archives/2007/12/summary.html.
-
Zhuge, J., et al. Studying Malicious Websites and the Underground Economy on the Chinese Website. Honeyblog 2007 [cited 2008 February 25]; Available from: http://honeyblog.org/archives/2007/12/summary.html.
-
-
-
-
19
-
-
85005305538
-
The Market for "Lemons": Quality Uncertainty and Market Mechanism
-
Akerlof, G.A., The Market for "Lemons": Quality Uncertainty and Market Mechanism. The Quarterly Journal of Economics, 1970. 84(3): p. 488-500.
-
(1970)
The Quarterly Journal of Economics
, vol.84
, Issue.3
, pp. 488-500
-
-
Akerlof, G.A.1
-
21
-
-
0842349296
-
Collecting and analyzing qualitative data for system dynamics: Methods and models
-
Luna-Reyes, L.F. and D.L. Andersen, Collecting and analyzing qualitative data for system dynamics: methods and models. System Dynamics Review, 2003. 19(4): p. 271-296.
-
(2003)
System Dynamics Review
, vol.19
, Issue.4
, pp. 271-296
-
-
Luna-Reyes, L.F.1
Andersen, D.L.2
-
22
-
-
63349095346
-
-
Gross, G. Internet Currency Firm Pleads Guilty to Money Laundering. PCWorld 2008 [cited 2008 July 23]; Available from: http://www.pcworld.com/businesscenter/article/ 148720/internet-currency-firm- pleads-guilty-to-money-laundering.html.
-
Gross, G. Internet Currency Firm Pleads Guilty to Money Laundering. PCWorld 2008 [cited 2008 July 23]; Available from: http://www.pcworld.com/businesscenter/article/ 148720/internet-currency-firm- pleads-guilty-to-money-laundering.html.
-
-
-
-
23
-
-
84869275019
-
-
cited 2007 July 20, Available from
-
Higgins, K.J. Bucks for Bugs. 2006 [cited 2007 July 20]; Available from: http://www.darkreading.com/document.asp?doc-id=99518.
-
(2006)
Bucks for Bugs
-
-
Higgins, K.J.1
-
24
-
-
84869274141
-
-
cited 2007 April 10, Available from
-
Landesman, M. Malware Revolution: A Change in Target. 2007 [cited 2007 April 10]; Available from: http://www.microsoft.com/technet/community/ columns/secm gmt/sm0307.mspx.
-
(2007)
Malware Revolution: A Change in Target
-
-
Landesman, M.1
|