-
1
-
-
78349249253
-
-
December 8 (Accessed January 30, 2009)
-
Carr, N.: Slutbot aces Turing Test*, December 8 (2007), http://www.roughtype.com/archives/2007/12/slutbot-passes.php (Accessed January 30, 2009)
-
(2007)
Slutbot Aces Turing Test*
-
-
Carr, N.1
-
4
-
-
78349254064
-
-
F-Secure, May 7 (accessed January 30, 2009)
-
F-Secure, Virus Descriptions: Kickin, F-Secure, May 7 (2003), http://www.f-secure.com/v-descs/kickin.shtml (accessed January 30, 2009)
-
(2003)
Virus Descriptions: Kickin
-
-
-
5
-
-
78349267410
-
-
Scientific American Mind, January 1 (accessed January 30, 2009)
-
Baetiong, F.: 'Classmates Reunion' Used as Malware Ploy., Scientific American Mind, January 1 (2009), http://blog.trendmicro.com/classmates-reunion- used-as-malware-ploy/ (accessed January 30, 2009)
-
(2009)
'Classmates Reunion' Used As Malware Ploy
-
-
Baetiong, F.1
-
6
-
-
78349291371
-
-
Computerworld Australia, December 15 (accessed January 30, 2009)
-
Rossi, S.: Beware the CyberLover that Steals Personal Data. Computerworld Australia, December 15 (2007), http://www.pcworld.com/printable/article/id, 140507/printable.html (accessed January 30, 2009)
-
(2007)
Beware the CyberLover That Steals Personal Data
-
-
Rossi, S.1
-
7
-
-
78349261057
-
-
Viruslist.com, July 13 (accessed January 30, 2009)
-
Schouwenberg, R.: Death of the IM-Worm? Viruslist.com, July 13 (2006), http://www.viruslist.com/en/analysis?pubid=191386185 (accessed January 30, 2009)
-
(2006)
Death of the IM-Worm?
-
-
Schouwenberg, R.1
-
9
-
-
78349253281
-
Facebook Gets Friended by Malware
-
August 26 (accessed Feburary 2, 2009)
-
Helft, M.: Facebook Gets Friended by Malware, The New York Times, August 26 (2008), http://bits.blogs.nytimes.com/2008/08/26/facebook-gets-friended-by- malware/ (accessed Feburary 2, 2009)
-
(2008)
The New York Times
-
-
Helft, M.1
-
10
-
-
78349255208
-
-
Kaspersky Lab, July 31 (accessed Feburary 2, 2009)
-
Kaspersky Lab, Kaspersky Lab Detects New Worms Attacking MySpace and Facebook, Kaspersky Lab, July 31 (2008), http://www.kaspersky.com/news?id= 207575670 (accessed Feburary 2, 2009)
-
(2008)
Kaspersky Lab Detects New Worms Attacking MySpace and Facebook
-
-
-
11
-
-
48649108112
-
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-like Networks
-
Acsac
-
Xie, M., Wu, Z., Wang, H.: HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-like Networks. In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp. 64-73. Acsac (2007)
-
(2007)
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)
, pp. 64-73
-
-
Xie, M.1
Wu, Z.2
Wang, H.3
-
13
-
-
78349231851
-
PandaLabs' 2009 Predictions: Malware Will Increas
-
PandaLab, December 21 (accessed Feburary 2, 2009)
-
PandaLab, PandaLabs' 2009 Predictions: Malware Will Increas. In: 2009, PandaLab, December 21 (2008), http://www.prweb.com/releases/2008/12/ prweb1772314.htm (accessed Feburary 2, 2009)
-
(2008)
2009, PandaLab
-
-
-
14
-
-
78349278270
-
-
European Network and Information Security Agency (ENISA), European Network and Information Security Agency
-
European Network and Information Security Agency (ENISA), Position Paper - Web 2.0 Security and Privacy. European Network and Information Security Agency (2008)
-
(2008)
Position Paper - Web 2.0 Security and Privacy
-
-
-
15
-
-
78349246593
-
Malicious Threats and Vulnerabilities in Instant Messaging
-
Hindocha, N., Chien, E.: Malicious Threats and Vulnerabilities in Instant Messaging. Symantec Security response (2003)
-
(2003)
Symantec Security Response
-
-
Hindocha, N.1
Chien, E.2
-
17
-
-
78349299643
-
-
National Infrastructure Security Coordination Centre (NISCC), National Infrastructure Security Coordination Centre (NISCC), NISCC Briefing 08a/2006
-
National Infrastructure Security Coordination Centre (NISCC), Social engineering against information systems: what is it and how do you protect yourself?, National Infrastructure Security Coordination Centre (NISCC), NISCC Briefing 08a/2006 (2006)
-
(2006)
Social Engineering Against Information Systems: What Is It and How Do You Protect Yourself?
-
-
-
18
-
-
78349240248
-
Malware gets up close and personal
-
Feburary 22 (accessed Feburary 2, 2009)
-
Nichols, S.: Malware gets up close and personal. IT News Australia, Feburary 22 (2008), http://www.itnews.com.au/News/70615,malware-gets-up-close- and-personal.aspx (accessed Feburary 2, 2009)
-
(2008)
IT News Australia
-
-
Nichols, S.1
-
20
-
-
78349288295
-
-
McAfee Avert Labs, McAfee Avert Labs
-
McAfee Avert Labs, Localized Malware Takes Root. McAfee Avert Labs (2008)
-
(2008)
Localized Malware Takes Root
-
-
-
21
-
-
78349278672
-
-
Forbes.com, November 25 (accessed on Feburary 2 2009)
-
Greenberg, A.: Robots In Disguise. Forbes.com, November 25 (2008), http://www.forbes.com/2008/11/25/cyber-security-bots-tech-identity08-cx-ag- 1125cyberbots.html (accessed on Feburary 2 2009)
-
(2008)
Robots in Disguise
-
-
Greenberg, A.1
-
22
-
-
78349274236
-
Microsoft Says Recovery from Malware Becoming Impossible
-
April 4
-
Naraine, R.: Microsoft Says Recovery from Malware Becoming Impossible. eWeek, April 4 (2006)
-
(2006)
eWeek
-
-
Naraine, R.1
-
23
-
-
77951728594
-
-
accessed Feburary 4, 2009
-
Strickland, J.: How Web 3.0 Will Work. HowStuffWorks, http://computer.howstuffworks.com/web-30.htm (accessed Feburary 4, 2009)
-
How Web 3.0 Will Work
-
-
Strickland, J.1
-
24
-
-
78349241634
-
The hidden flaws in Web 2.0
-
The Economist, August 8 (accessed Feburary 4, 2009)
-
Nuttall, C.: The hidden flaws in Web 2.0., Global Technology Forum, Economist Intelligence Unit, The Economist, August 8 (2006), http://globaltechforum.eiu.com/index.asp?categoryid=&channelid=&doc-id= 9168&layout=rich-story&search=footing (accessed Feburary 4, 2009)
-
(2006)
Global Technology Forum
-
-
Nuttall, C.1
-
25
-
-
78349282477
-
Malicious worm that talks back
-
December 12 (accessed Feburary 4, 2009)
-
Thompson, B.: Malicious worm that talks back. BBC News, December 12 (2005), http://news.bbc.co.uk/2/hi/technology/4520766.stm (accessed Feburary 4, 2009)
-
(2005)
BBC News
-
-
Thompson, B.1
-
26
-
-
78349253661
-
Destructive Koobface virus turns up on Facebook
-
December 4 (accessed Feburary 4, 2009)
-
Finkle, J.: Destructive Koobface virus turns up on Facebook. Reuters, December 4 (2008), http://www.reuters.com/article/newsOne/idUSTRE4B37LV20081204 (accessed Feburary 4, 2009)
-
(2008)
Reuters
-
-
Finkle, J.1
-
29
-
-
78349246139
-
Firms must be alert to social engineering tricks
-
September 26 (accessed Feburary 7, 2009)
-
Muncaster, P.: Firms must be alert to social engineering tricks. IT Week, September 26 (2007), http://www.vnunet.com/itweek/news/2199635/firms-alert- social-engineering (accessed Feburary 7, 2009)
-
(2007)
IT Week
-
-
Muncaster, P.1
-
31
-
-
0037475135
-
A survey of socially interactive robots
-
Fong, T., Nourbakhsh, I., Dautenhahn, K.: A survey of socially interactive robots. Robotics and Autonomous Systems 42, 143-166 (2003)
-
(2003)
Robotics and Autonomous Systems
, vol.42
, pp. 143-166
-
-
Fong, T.1
Nourbakhsh, I.2
Dautenhahn, K.3
-
32
-
-
0004246220
-
-
PhD thesis, University of Southern California
-
Cohen, F.: Computer Viruses. PhD thesis, University of Southern California (1985)
-
(1985)
Computer Viruses
-
-
Cohen, F.1
-
34
-
-
17644421307
-
Recent Worms: A Survey and Trends
-
Kienzle, D., Elder, M.: Recent Worms: A Survey and Trends. In: WORM 2003, Washington, DC, USA, October 27 (2003)
-
WORM 2003, Washington, DC, USA, October 27 (2003)
-
-
Kienzle, D.1
Elder, M.2
-
36
-
-
0031258214
-
Computer Immunology
-
October
-
Forrest, S., Hofmeyr, S.A., Somayaji, A.: Computer Immunology. Communications of the ACM 40(10) (October 1997)
-
(1997)
Communications of the ACM
, vol.40
, pp. 10
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
37
-
-
78349265954
-
-
Communication and Operating Systems Group, Berlin University of Technology
-
Youansi, G.N.: Artificial Immune System. Communication and Operating Systems Group, Berlin University of Technology (2006)
-
(2006)
Artificial Immune System
-
-
Youansi, G.N.1
-
38
-
-
35048840752
-
Intelligent Agent Technology in E-Commerce
-
Liu, J., Cheung, Y.-m., Yin, H. (eds.) IDEAL 2003. Springer, Heidelberg
-
Goh, O.S., Fung, C.C.: Intelligent Agent Technology in E-Commerce. In: Liu, J., Cheung, Y.-m., Yin, H. (eds.) IDEAL 2003. LNCS, vol. 2690. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2690
-
-
Goh, O.S.1
Fung, C.C.2
-
39
-
-
78349233338
-
Has text-porn finally made computers human
-
Feburary 20 (accessed January 30, 2009)
-
Ward, M.: Has text-porn finally made computers human. BBC News, Feburary 20 (2004), http://news.bbc.co.uk/2/hi/uk-news/magazine/3503465.stm (accessed January 30, 2009)
-
(2004)
BBC News
-
-
Ward, M.1
-
41
-
-
6344249640
-
The unfriendly user: Exploring social reactions to chatterbots
-
Academic Press, London
-
Angeli, A., Johnson, G.I., Coventry, L.: The unfriendly user: exploring social reactions to chatterbots. In: International Conference on Affective Human Factors Design, Asean. Academic Press, London (2001)
-
(2001)
International Conference on Affective Human Factors Design, Asean
-
-
Angeli, A.1
Johnson, G.I.2
Coventry, L.3
-
42
-
-
84885005824
-
An Analysis of Man-machine Interaction in Instant Messenger
-
Goh, O.S., Fung, C.C., Depickere, A., Wong, K.W.: An Analysis of Man-machine Interaction in Instant Messenger. Advances in Communication Systems and Electrical Engineering (2008)
-
(2008)
Advances in Communication Systems and Electrical Engineering
-
-
Goh, O.S.1
Fung, C.C.2
Depickere, A.3
Wong, K.W.4
-
43
-
-
0037826637
-
Persuasive Technologies
-
May
-
Fogg, B.J.: Persuasive Technologies. Communications of the ACM 42(5) (May 1999)
-
(1999)
Communications of the ACM
, vol.42
, pp. 5
-
-
Fogg, B.J.1
-
44
-
-
78349270733
-
-
Kelvir.EB. (accessed May 17, 2009)
-
SpywareGuide, Kelvir.EB. FaceTime Security Labs, http://www.spywareguide. com/product-show.php?id=3353 (accessed May 17, 2009)
-
FaceTime Security Labs
-
-
-
45
-
-
78349296240
-
-
Cyberlover (accessed May 17, 2009)
-
Cyberlover, http://habrahabr.ru/blogs/cyberpunk/17263/ (accessed May 17, 2009)
-
-
-
|