-
1
-
-
75249095435
-
-
Retrieved November 20, 2008, from
-
Baker, G. (2008). Schoolboy hacks into city's tram system. Retrieved November 20, 2008, from http://www.telegraph.co.uk/news/worldnews/1575293/Schoolboy-hacks-into-city's-tram-system.html.
-
(2008)
Schoolboy Hacks into City's Tram System
-
-
Baker, G.1
-
2
-
-
75249092908
-
-
Retrieved November 20, 2008, from
-
Bernstein, S., & Blankstein, A. (2007). 2 deny hacking into L.A.'s traffic light system. Retrieved November 20, 2008, from http://www.latimes.com/news/local/la-me-trafficlights9jan09,0,7005703.story.
-
(2007)
2 Deny Hacking into L.A.'s Traffic Light System
-
-
Bernstein, S.1
Blankstein, A.2
-
5
-
-
75249088213
-
-
Retrieved February 2, 2009, from
-
Bradbury, D. (2009). The fog of cyberwar. Retrieved February 2, 2009, from http://www.guardian.co.uk/technology/2009/feb/05/kyrgyzstan-cyberattack-internet-access.
-
(2009)
The Fog of Cyberwar
-
-
Bradbury, D.1
-
7
-
-
35348847240
-
Organized cybercrime? How cyberspace may affect the structure of criminal relationships
-
Brenner, S.W. (2002). Organized cybercrime? How cyberspace may affect the structure of criminal relationships. North Carolina Journal of Law & Technology, 4(1), 1-41.
-
(2002)
North Carolina Journal of Law & Technology
, vol.4
, Issue.1
, pp. 1-41
-
-
Brenner, S.W.1
-
9
-
-
75249107085
-
-
Council of Europe, Retrieved October 15, 2005, from
-
Council of Europe. (2004). Summary of the Organized Crime Situation Report 2004: Focus on the threat of cybercrime. Retrieved October 15, 2005, from http://www.coe.int/T/E/Legal_affairs/Legal_cooperation/Combating_economic_crime/Organised_crime/Documents/OrgCrimeRep2004Summ.pdf.
-
(2004)
Summary of the Organized Crime Situation Report 2004: Focus On The Threat of Cybercrime
-
-
-
10
-
-
75249104831
-
-
Retrieved November 20, 2008, from
-
Crawford, M. (2006). Utility hack led to security overhaul. Retrieved November 20, 2008, from http://www.computerworld.com/securitytopics/security/story/0,10801,108735,00.html.
-
(2006)
Utility Hack Led to Security Overhaul
-
-
Crawford, M.1
-
11
-
-
75249107885
-
-
DarkAge, Retrieved March 23, 2008, from
-
DarkAge. (n.d). Toolkit. Retrieved March 23, 2008, from http://www.darkage.co.uk/rpg/computers/toolkit.htm.
-
Toolkit
-
-
-
13
-
-
63349101242
-
Battling botnets and online mobs: Estonia's defense efforts during the Internet war
-
Evron, G. (2008, Winter/Spring). Battling botnets and online mobs: Estonia's defense efforts during the Internet war. Science & Technology, 121-126.
-
(2008)
Science & Technology
, Issue.Winter-Spring
, pp. 121-126
-
-
Evron, G.1
-
14
-
-
3943076566
-
Cyberterrorism, computer crime, and reality
-
Foltz, C.B. (2004). Cyberterrorism, computer crime, and reality. Information Management & Computer Security, 12(2), 154-166.
-
(2004)
Information Management & Computer Security
, vol.12
, Issue.2
, pp. 154-166
-
-
Foltz, C.B.1
-
15
-
-
84937344840
-
Transnational organized crime: A European perspective
-
Jamieson, A. (2001). Transnational organized crime: A European perspective. Studies in Conflict and Terrorism, 24(5), 377-387.
-
(2001)
Studies in Conflict and Terrorism
, vol.24
, Issue.5
, pp. 377-387
-
-
Jamieson, A.1
-
16
-
-
75249106370
-
-
Retrieved February 8, 2009, from
-
Keizer, G. (2009). Russian 'cybermilitia' knocks Kyrgyzstan offline. Retrieved February 8, 2009, from http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9126947&intsrc=news_ts_head.
-
(2009)
Russian 'cybermilitia' Knocks Kyrgyzstan Offline
-
-
Keizer, G.1
-
17
-
-
75249086744
-
Cyber terror: Missing in action
-
In D. Clarke (Ed.), New Brunswick, NJ: Transaction
-
Lewis, J. (2004). Cyber terror: Missing in action. In D. Clarke (Ed.), Technology and terrorism (pp. 145-153). New Brunswick, NJ: Transaction.
-
(2004)
Technology and Terrorism
, pp. 145-153
-
-
Lewis, J.1
-
18
-
-
75249087555
-
-
Retrieved November 21, 2008, from
-
Markoff, J. (2008). Before the gunfire, cyberattacks. Retrieved November 21, 2008, from http://www.nytimes.com/2008/08/13/technology/13cyber.html?_r=1&ref=europe&pagewanted=print.
-
(2008)
Before the Gunfire, Cyberattacks
-
-
Markoff, J.1
-
20
-
-
75249095299
-
-
McAfee, Retrieved November 3, 2007, from
-
McAfee. (2006). Rootkits, Part 1 of 3: The growing threat. Retrieved November 3, 2007, from http://www.mcafee.com/us/local_content/white_papers/threat_center/wp_akapoor_rootkits1_en.pdf.
-
(2006)
Rootkits, Part 1 of 3: The Growing Threat
-
-
-
22
-
-
78651111678
-
-
Retrieved November 21, 2008, from
-
Naraine, R., Danchev, D., & O'Donnell, A. (2008). Coordinated Russia vs Georgia cyberattack in progress. Retrieved November 21, 2008, from http://blogs.zdnet.com/security/?p=1670.
-
(2008)
Coordinated Russia vs Georgia Cyberattack in Progress
-
-
Naraine, R.1
Danchev, D.2
O'Donnell, A.3
-
24
-
-
75249093767
-
Cyberextortion: An overview of distributed denial of service attacks against online gaming companies
-
Paulson, R.A., & Weber, J.E. (2006). Cyberextortion: An overview of distributed denial of service attacks against online gaming companies. Issues in Information Systems, 7(2), 52-56.
-
(2006)
Issues in Information Systems
, vol.7
, Issue.2
, pp. 52-56
-
-
Paulson, R.A.1
Weber, J.E.2
-
25
-
-
75149197559
-
-
Bureau of Justice Statistics. Retrieved February 19, 2009, from
-
Rantala, R. (2008). Cybercrimes against businesses, 2005. Bureau of Justice Statistics. Retrieved February 19, 2009, from http://www.ojp.usdoj.gov/bjs/pub/pdf/cb05.pdf.
-
(2008)
Cybercrimes Against Businesses, 2005
-
-
Rantala, R.1
-
26
-
-
12344298391
-
Modeling and simulating critical infrastructures and their interdependencies
-
Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 2
-
Rinaldi, S. (2004). Modeling and simulating critical infrastructures and their interdependencies. Hawaii International Conference on System Sciences (Vol. 2, No. 2, p. 20054a), Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 2.
-
(2004)
Hawaii International Conference On System Sciences
, vol.2
, Issue.2
-
-
Rinaldi, S.1
-
30
-
-
85044794413
-
Transnational terror and organized crime: Blurring the lines
-
Sanderson, T. (2004). Transnational terror and organized crime: Blurring the lines. SAIS Review, 24(1), 49-61.
-
(2004)
SAIS Review
, vol.24
, Issue.1
, pp. 49-61
-
-
Sanderson, T.1
-
31
-
-
0040146085
-
Links between transnational organized crime and terrorist crimes
-
Schmid, A. (1996). Links between transnational organized crime and terrorist crimes. Transnational Organized Crime, 2(4), 40-82.
-
(1996)
Transnational Organized Crime
, vol.2
, Issue.4
, pp. 40-82
-
-
Schmid, A.1
-
32
-
-
34047144699
-
-
Retrieved August 27, 2007, from
-
Stamp, J., Dillinger, J., Young, W., & DePoy, J. (2003). Common vulnerabilities in critical infra-structure control systems. Retrieved August 27, 2007, from http://www.oe.netl.doe.gov/docs/prepare/vulnerabilities.pdf.
-
(2003)
Common Vulnerabilities in Critical Infra-structure Control Systems
-
-
Stamp, J.1
Dillinger, J.2
Young, W.3
Depoy, J.4
-
33
-
-
75249100844
-
-
Symantec, Retrieved November 3, 2007, from
-
Symantec. (2000). Learn more about viruses and worms. Retrieved November 3, 2007, from http://www.symantec.com/avcenter/reference/worm.vs.virus.pdf.
-
(2000)
Learn More About Viruses and Worms
-
-
-
34
-
-
51249108585
-
-
Symantec, Retrieved October 31, 2007, from
-
Symantec. (2007a). Symantec Internet Security Threat Report: Trends for January-June 2007. Retrieved October 31, 2007, from http://eval.symantec.com/mktginfo/enterprise/white_papers/ent_whitepaper_internet_security_threat_resport_xii_09_2007.en-us.pdf.
-
(2007)
Symantec Internet Security Threat Report: Trends for January-June 2007
-
-
-
35
-
-
75249089961
-
-
Symantec, Retrieved July 3, 2007, from
-
Symantec. (2007b). What is cybercrime? Retrieved July 3, 2007, from http://www.symantec.com/avcenter/cybercrime/index_page2.html.
-
(2007)
What is Cybercrime?
-
-
-
36
-
-
33846043733
-
-
Upper Saddle River, NJ: Pearson Education
-
Taylor, R.W., Caeti, T.J., Loper, D.K., Fritsch, E.J., & Liederbach, J. (2006). Digital crime and digital terrorism. Upper Saddle River, NJ: Pearson Education.
-
(2006)
Digital Crime and Digital Terrorism
-
-
Taylor, R.W.1
Caeti, T.J.2
Loper, D.K.3
Fritsch, E.J.4
Liederbach, J.5
-
37
-
-
75249085132
-
-
Retrieved November 20, 2008, from
-
Thomson, I. (2008). LA engineers admit traffic-light hack. Retrieved November 20, 2008, from http://uk.news.yahoo.com/16/20081112/ttc-la-engineers-admit-traffic-light-hac-6315470.html.
-
(2008)
La Engineers Admit Traffic-light Hack
-
-
Thomson, I.1
|