메뉴 건너뛰기




Volumn , Issue , 2009, Pages 290-294

Spammer and hacker, two old friends

Author keywords

[No Author keywords available]

Indexed keywords

BEST-PRACTICES; BYPASS FILTERS; POSSIBLE SOLUTIONS; SECURE SOFTWARE; SECURE SOFTWARE DEVELOPMENT; SECURITY VULNERABILITIES; SOFTWARE SECURITY; SPAMMERS; WEB APPLICATION; WEB USERS; WEBSITE POPULARITY;

EID: 71649108373     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DEST.2009.5276764     Document Type: Conference Paper
Times cited : (12)

References (20)
  • 1
    • 24344438696 scopus 로고    scopus 로고
    • Secure software development by example
    • July/August
    • A. Apvrille and M. Pourzandi. Secure software development by example. IEEE Security & Privacy, 3(4):10-17, July/August 2005.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.4 , pp. 10-17
    • Apvrille, A.1    Pourzandi, M.2
  • 3
    • 71649111203 scopus 로고    scopus 로고
    • W. A. S. Consortium. Threat classification. Word Wide Web. http://www.webappsec.org/projects/threat/, 2005.
    • W. A. S. Consortium. Threat classification. Word Wide Web. http://www.webappsec.org/projects/threat/, 2005.
  • 4
    • 71649105972 scopus 로고    scopus 로고
    • S. Focus. Microsoft internet explorer html objects variant memory corruption vulnerability. Word Wide Web. http://www.securityfocus.com/bid/30610/ discuss., 2008.
    • S. Focus. Microsoft internet explorer html objects variant memory corruption vulnerability. Word Wide Web. http://www.securityfocus.com/bid/30610/ discuss., 2008.
  • 5
    • 71649107952 scopus 로고    scopus 로고
    • S. Focus. Microsoft outlook web access login form remote uri redirection vulnerability. Word Wide Web. http://www.securityfocus.com/bid/12459/info., 2008.
    • S. Focus. Microsoft outlook web access login form remote uri redirection vulnerability. Word Wide Web. http://www.securityfocus.com/bid/12459/info., 2008.
  • 6
    • 17844404852 scopus 로고    scopus 로고
    • Malicious bots threaten network security
    • Jan
    • D. Geer. Malicious bots threaten network security. Computer, 38(1):18-20, Jan. 2005.
    • (2005) Computer , vol.38 , Issue.1 , pp. 18-20
    • Geer, D.1
  • 11
    • 1942489978 scopus 로고    scopus 로고
    • Hacking: Motivation and deterrence, part i
    • P. Hoath and T. Mulhall. Hacking: Motivation and deterrence, part i. Computer Fraud & Security, 1998(4):16-19, 1998.
    • (1998) Computer Fraud & Security , vol.1998 , Issue.4 , pp. 16-19
    • Hoath, P.1    Mulhall, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.