-
1
-
-
67249127704
-
-
B. Violino, After phishing? Pharming!, CSO Magazine, October 2005, http://www.csoonline.com/read/100105/pharm.html.
-
B. Violino, "After phishing? Pharming!," CSO Magazine, October 2005, http://www.csoonline.com/read/100105/pharm.html.
-
-
-
-
3
-
-
67249128158
-
-
Cyveillance Inc
-
Cyveillance Inc., "Cyveillance anti-phishing datasheet," 2007, http://www.cyveillance.com/web/docs/AntiPhishing.pdf.
-
(2007)
Cyveillance anti-phishing datasheet
-
-
-
4
-
-
67249121659
-
-
InternetIdentity Inc
-
InternetIdentity Inc., "PowerShark phishing site deactivation," 2008, http://www.internetidentity.com/phishing-site-takedown.html.
-
(2008)
PowerShark phishing site deactivation
-
-
-
6
-
-
54249158448
-
-
T. Moore and R. Clayton, Evaluating the wisdom of crowds in assessing phishing websites, in 12th International Financial Cryptography and Data Security Conference (FC08), Springer Lecture Notes on Computer Science (LNCS), 5143, 2008, pp. 16-30.
-
T. Moore and R. Clayton, "Evaluating the wisdom of crowds in assessing phishing websites," in 12th International Financial Cryptography and Data Security Conference (FC08), Springer Lecture Notes on Computer Science (LNCS), vol. 5143, 2008, pp. 16-30.
-
-
-
-
9
-
-
67249118387
-
-
T. Moore and R. Clayton, Evil Searching: compromise and recompromise of Internet hosts for phishing, in submission, 2008.
-
T. Moore and R. Clayton, "Evil Searching: compromise and recompromise of Internet hosts for phishing," in submission, 2008.
-
-
-
-
12
-
-
33750482906
-
System reliability and free riding
-
Advances in Information Security, L. J. Camp and S. Lewis, Eds. Boston: Kluwer Academic Publishers
-
H. Varian, "System reliability and free riding," in Economics of Information Security, Vol. 12, Advances in Information Security, L. J. Camp and S. Lewis, Eds. Boston: Kluwer Academic Publishers, 2004, pp. 1-15.
-
(2004)
Economics of Information Security
, vol.12
, pp. 1-15
-
-
Varian, H.1
-
13
-
-
67249105614
-
-
23 April
-
M. Hypponen (private communication), 23 April 2008.
-
(2008)
-
-
Hypponen, M.1
-
14
-
-
67249152912
-
-
The Register, 6 March, ruling angers industry
-
R. Lemos, "Anti-virus groups fight over Crossover sharing," The Register, 6 March 2006, http://www.theregister.co.uk/2006/03/06/crossover ruling angers industry/.
-
(2006)
Anti-virus groups fight over Crossover sharing
-
-
Lemos, R.1
-
15
-
-
67249114162
-
-
B. Krebs, Defcon speakers team up to fight 'queen bots', Washington Post, 9 August 2006, http://blog.washingtonpost.com/securityfix/2006/ 08/defcon speakers team up to fig.html.
-
B. Krebs, "Defcon speakers team up to fight 'queen bots'," Washington Post, 9 August 2006, http://blog.washingtonpost.com/securityfix/2006/ 08/defcon speakers team up to fig.html.
-
-
-
-
16
-
-
84876278827
-
-
Security Focus Inc
-
Security Focus Inc., "Bugtraq mailing list," http://www.securityfocus. com/archive/1.
-
Bugtraq mailing list
-
-
-
18
-
-
20944441343
-
Market for software vulnerabilities? Think again
-
K. Kannan and R. Telang, "Market for software vulnerabilities? Think again," Management Science, vol. 51, no. 5, 2005, pp. 726-740.
-
(2005)
Management Science
, vol.51
, Issue.5
, pp. 726-740
-
-
Kannan, K.1
Telang, R.2
-
23
-
-
30344482454
-
Information security: Progress made, but challenges remain to protect federal systems and the nation's critical infrastructures,
-
US General Accounting Office GAO, GAO-03-564T, April
-
R. Dacey, "Information security: Progress made, but challenges remain to protect federal systems and the nation's critical infrastructures, " US General Accounting Office (GAO), GAO-03-564T, April 2003, pp. 1-75.
-
(2003)
, pp. 1-75
-
-
Dacey, R.1
-
24
-
-
0344899914
-
Sharing information on computer systems security: An economic analysis
-
L. Gordon, M. Loeb and W. Lucyshyn, "Sharing information on computer systems security: An economic analysis," Journal of Accounting and Public Policy, vol. 22, no. 6, 2003, pp. 461-485.
-
(2003)
Journal of Accounting and Public Policy
, vol.22
, Issue.6
, pp. 461-485
-
-
Gordon, L.1
Loeb, M.2
Lucyshyn, W.3
-
25
-
-
30344462995
-
The economic incentives for sharing security information
-
E. Gal-Or and A. Ghose, "The economic incentives for sharing security information," Information Systems Research, vol. 16, no. 2, 2005, pp. 186-208.
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
26
-
-
0000071449
-
From weakest-link to best-shot: The voluntary provision of public goods
-
J. Hirshleifer, "From weakest-link to best-shot: the voluntary provision of public goods," Public Choice, vol. 41, 1983, pp. 371-386.
-
(1983)
Public Choice
, vol.41
, pp. 371-386
-
-
Hirshleifer, J.1
|