-
1
-
-
67249120924
-
-
European Network and Information Security Agency ENISA
-
Anderson, R., Böhme, R., Clayton, R., Moore, T.: Security economics and the internal market. European Network and Information Security Agency (ENISA) (2008), http://enisa.europa.eu/doc/pdf/report-sec-econ-&-int-mark- 20080131.pdf
-
(2008)
Security economics and the internal market
-
-
Anderson, R.1
Böhme, R.2
Clayton, R.3
Moore, T.4
-
2
-
-
33750440197
-
The economics of information security
-
Anderson, R., Moore, T.: The economics of information security. Science 314 (5799), 610-613 (2006)
-
(2006)
Science
, vol.314
, Issue.5799
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
5
-
-
42149173109
-
Using uncleanliness to predict future botnet addresses
-
ACM Press, New York
-
Collins, M.P., Shimeall, T.J., Faber, S., Janies, J., Weaver, R., De Shon, M., Kadane, J.: Using uncleanliness to predict future botnet addresses. In: Proceedings of the ACM SIGCOMM Conference on Internet Measurement (IMC), pp. 93-104. ACM Press, New York (2007)
-
(2007)
Proceedings of the ACM SIGCOMM Conference on Internet Measurement (IMC)
, pp. 93-104
-
-
Collins, M.P.1
Shimeall, T.J.2
Faber, S.3
Janies, J.4
Weaver, R.5
De Shon, M.6
Kadane, J.7
-
7
-
-
70350354421
-
Identifiable fingerprints in network applications
-
Damron, J.: Identifiable fingerprints in network applications. USENIX; login 28(6), 16-20 (2003)
-
(2003)
USENIX; login
, vol.28
, Issue.6
, pp. 16-20
-
-
Damron, J.1
-
8
-
-
70350401488
-
-
Dausin, M.: PHP File Include Attacks. Tipping Point (February 2008), http://dvlabs.tippingpoint.com/blog/2008/02
-
Dausin, M.: PHP File Include Attacks. Tipping Point (February 2008), http://dvlabs.tippingpoint.com/blog/2008/02
-
-
-
-
10
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of Internet miscreants
-
CCS, pp
-
Franklin, J., Paxson, V., Perrig, A., Savage, S.: An inquiry into the nature and causes of the wealth of Internet miscreants. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), pp. 375-388 (2007)
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 375-388
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
13
-
-
70350384945
-
Phishers Enlist Google 'Dorks'
-
March
-
Higgins, K.J.: Phishers Enlist Google 'Dorks'. DarkReading (March 2008), http://www.darkreading.com/document.asp?doc-id=149324
-
(2008)
DarkReading
-
-
Higgins, K.J.1
-
14
-
-
70350354422
-
-
Personal communication, March 28
-
LaCour, J.: Personal communication, March 28 (2008)
-
(2008)
-
-
LaCour, J.1
-
18
-
-
70350690706
-
-
McAfee Inc
-
McAfee Inc. SiteAdvisor, http://www.siteadvisor.com
-
SiteAdvisor
-
-
-
20
-
-
70350358836
-
-
Netcraft Inc. March 2008 Web Server Survey (2008), http://news.netcraft. com/archives/web-server-survey.html
-
Netcraft Inc. March 2008 Web Server Survey (2008), http://news.netcraft. com/archives/web-server-survey.html
-
-
-
-
21
-
-
70350363819
-
-
PhishTank, http://www.phishtank.com/
-
PhishTank
-
-
-
22
-
-
80053650188
-
All your iFrames point to us
-
Provos, N., Mavrommatis, P., Rajab, M., Monrose, F.: All your iFrames point to us. In: 17th USENIX Security Symposium, pp. 1-15 (2008)
-
(2008)
17th USENIX Security Symposium
, pp. 1-15
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.3
Monrose, F.4
-
23
-
-
54249112525
-
-
Stop Badware, http://www.stopbadware.org/
-
Stop Badware
-
-
-
24
-
-
51349104113
-
-
The Webalizer, http://www.mrunix.net/webalizer/
-
The Webalizer
-
-
-
25
-
-
70350423437
-
The underground economy: Priceless
-
Thomas, R., Martin, J.: The underground economy: priceless. USENIX; login 31(6), 7-16 (2006)
-
(2006)
USENIX; login
, vol.31
, Issue.6
, pp. 7-16
-
-
Thomas, R.1
Martin, J.2
-
28
-
-
70350360750
-
-
Yahoo! Inc. Yahoo! Search Web Services, http://developer.yahoo.com/ search/
-
Yahoo! Inc. Yahoo! Search Web Services, http://developer.yahoo.com/ search/
-
-
-
|