-
1
-
-
79952066310
-
Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities
-
K. Kenneth.J, Ed. Hershey, PA: Information Science Reference (an Imprint of IGI Global), doi
-
J. Radianti and J. J. Gonzalez, "Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities," in Cyber-Security and Global Information Assurance: Threat Analysis And Response Solutions, K. Kenneth.J, Ed. Hershey, PA: Information Science Reference (an Imprint of IGI Global), 2009, pp. 1-22.doi.
-
(2009)
Cyber-Security and Global Information Assurance: Threat Analysis and Response Solutions
, pp. 1-22
-
-
Radianti, J.1
Gonzalez, J.J.2
-
2
-
-
77952415099
-
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
-
presented at
-
J. Franklin, V. Paxson, A. Perrig, and S. Savage, "An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants," presented at 14 th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, USA, 2007.
-
14 Th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, USA, 2007
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
3
-
-
79952058628
-
-
Symantec Enterprise Security Access date:April 20, 2010
-
Symantec, "Symantec Report on Underground Economy July 07-June 08," Symantec Enterprise Security 2008, 〈http://eval.symantec.com/ mktginfo/enterprise/white-papers/bwhitepaper-underground-economy-report-11-2008- 14525717.en-us.pdf〉. Access date:April 20, 2010.
-
(2008)
Symantec Report on Underground Economy July 07-June 08
-
-
-
4
-
-
77954521285
-
Studying Malicious Websites and the Underground Economy on the Chinese Website
-
Springer US, doi: 10.1007/978-0-387-09762-6-11
-
J. Zhuge, T. Holz, C. Song, J. Guo, X. Han, and W. Zou, "Studying Malicious Websites and the Underground Economy on the Chinese Website," in Managing Information Risk and the Economics of Security: Springer US, 2009.doi: 10.1007/978-0-387-09762-6-11.
-
(2009)
Managing Information Risk and the Economics of Security
-
-
Zhuge, J.1
Holz, T.2
Song, C.3
Guo, J.4
Han, X.5
Zou, W.6
-
6
-
-
84863536022
-
-
University of Brighton, Brighton, UK Access date:March 20, 2010
-
H. Rush, C. Smith, E. Kraemer-Mbula, and P. Tang, "Cybercrime and Illegal Innovation," University of Brighton, Brighton, UK 2009, 〈http://eprints.brighton.ac.uk/5800/01/Crime-Online.pdf〉. Access date:March 20, 2010.
-
(2009)
Cybercrime and Illegal Innovation
-
-
Rush, H.1
Smith, C.2
Kraemer-Mbula, E.3
Tang, P.4
-
7
-
-
79952054987
-
Using Mixed Data Collection to Uncover Vulnerability Black Markets
-
presented at
-
J. Radianti, E. Rich, and J. J. Gonzalez, "Using Mixed Data Collection to Uncover Vulnerability Black Markets," presented at Workshop of Information Security and Privacy, Quebec, Canada, 2007.
-
Workshop of Information Security and Privacy, Quebec, Canada, 2007
-
-
Radianti, J.1
Rich, E.2
Gonzalez, J.J.3
-
8
-
-
63349111065
-
Vulnerability Black Markets: Empirical Evidence and Scenario Simulation
-
presented at
-
J. Radianti, E. Rich, and J. J. Gonzalez, "Vulnerability Black Markets: Empirical Evidence and Scenario Simulation," presented at The Forty Second Annual Hawaii International Conference on System Sciences The Big Island, Hawaii, 2009.
-
Forty Second Annual Hawaii International Conference on System Sciences the Big Island, Hawaii, 2009
-
-
Radianti, J.1
Rich, E.2
Gonzalez, J.J.3
-
9
-
-
79952060010
-
Classification of Malicious Tools in Underground Markets for Vulnerabilities
-
presented at
-
J. Radianti and N. Ulltveit-Moe, "Classification of Malicious Tools in Underground Markets for Vulnerabilities," presented at Norsk informasjonssikkerhetskonferanse (NISK), Kristiansand, Norway, 2008.
-
Norsk Informasjonssikkerhetskonferanse (NISK), Kristiansand, Norway, 2008
-
-
Radianti, J.1
Ulltveit-Moe, N.2
-
11
-
-
0036939060
-
Low Self-Control, Organizational Theory and Corporate Crime
-
S. S. Simpson and N. L. Piquero, "Low Self-Control, Organizational Theory and Corporate Crime," Law and Society Review, vol. 36, pp. 509-548, 2002.
-
(2002)
Law and Society Review
, vol.36
, pp. 509-548
-
-
Simpson, S.S.1
Piquero, N.L.2
|