메뉴 건너뛰기




Volumn 4, Issue 4, 2010, Pages 343-354

Securing computerised models and data against integrity attacks

Author keywords

Computerised models; Cyber crimes; Cyber security; Electronic finance; Electronic security; Finance models

Indexed keywords


EID: 79952270592     PISSN: 17460069     EISSN: 17460077     Source Type: Journal    
DOI: 10.1504/IJEF.2010.035729     Document Type: Article
Times cited : (4)

References (27)
  • 2
    • 0003516333 scopus 로고    scopus 로고
    • Technical Report No., Department of Computer Engineering, Chalmers University of Technology, Sweden, March
    • Axelsson, S. (2000) Intrusion Detection Systems: A Survey and Taxonomy, Technical Report No. 99-15, Department of Computer Engineering, Chalmers University of Technology, Sweden, March.
    • (2000) Intrusion Detection Systems: A Survey and Taxonomy
    • Axelsson, S.1
  • 5
    • 51349128465 scopus 로고    scopus 로고
    • Preventing and detecting insider attacks using IDS
    • March 20
    • Einwechter, N. (2002) 'Preventing and detecting insider attacks using IDS', Security Focus, March 20, available at: http://www.securityfocus.com/infocus/1558
    • (2002) Security Focus
    • Einwechter, N.1
  • 6
    • 84896900298 scopus 로고    scopus 로고
    • Using relative movement to support ANN-based stock forecasting in Thai stock market
    • Esichaikul, V. and Srithongnopawong, P. (2010) 'Using relative movement to support ANN-based stock forecasting in Thai stock market', International Journal of Electronic Finance, Vol. 4, No. 1, pp. 84-98.
    • (2010) International Journal of Electronic Finance , vol.4 , Issue.1 , pp. 84-98
    • Esichaikul, V.1    Srithongnopawong, P.2
  • 7
    • 3943076566 scopus 로고    scopus 로고
    • Cyberterrorism, computer crime, and reality
    • Foltz, C.B. (2004) 'Cyberterrorism, computer crime, and reality', Information Management & Computer Security, Vol. 12, No. 2, pp. 154-166.
    • (2004) Information Management & Computer Security , vol.12 , Issue.2 , pp. 154-166
    • Foltz, C.B.1
  • 8
    • 2942671125 scopus 로고    scopus 로고
    • Risk in fixed-income hedge fund styles
    • September
    • Fung, W. and Hsieh, D.A. (2002) 'Risk in fixed-income hedge fund styles', The Journal of Fixed Income, Vol. 12, No. 2, September, pp. 6-36.
    • (2002) The Journal of Fixed Income , vol.12 , Issue.2 , pp. 6-36
    • Fung, W.1    Hsieh, D.A.2
  • 9
    • 3943054719 scopus 로고    scopus 로고
    • Politicians speak out on cyberterrorism
    • Gengler, B. (1999) 'Politicians speak out on cyberterrorism', Network Security, Vol. 11, No. 10, p. 6.
    • (1999) Network Security , vol.11 , Issue.10 , pp. 6
    • Gengler, B.1
  • 11
    • 78649870798 scopus 로고    scopus 로고
    • Exploring the security of e-banking systems: Questions of theft, fraud, jurisdiction and the shifting sands of time
    • Jain, V. and Kohli, S. (2009) 'Exploring the security of e-banking systems: questions of theft, fraud, jurisdiction and the shifting sands of time', International Journal of Electronic Finance, Vol. 3, No. 4, pp. 339-352.
    • (2009) International Journal of Electronic Finance , vol.3 , Issue.4 , pp. 339-352
    • Jain, V.1    Kohli, S.2
  • 15
    • 84951911842 scopus 로고    scopus 로고
    • CNET News.com, December 18
    • Lemos, R. (2002) Ex-IT Worker Charged with Sabotage, CNET News.com, December 18, available at: http://news.com.com/2100-1001/978386.html
    • (2002) Ex-IT Worker Charged with Sabotage
    • Lemos, R.1
  • 16
    • 67650270836 scopus 로고    scopus 로고
    • Firms seek edge through speed as computer trading expands
    • December 15
    • Lucchetti, A. (2006) 'Firms seek edge through speed as computer trading expands', Wall Street Journal, December 15, p.A1.
    • (2006) Wall Street Journal , pp. A1
    • Lucchetti, A.1
  • 17
    • 84993063392 scopus 로고    scopus 로고
    • The impact of automatic identification on supply chain operations
    • McFarlane, D. and Sheffi, Y. (2003) 'The impact of automatic identification on supply chain operations', International Journal of Logistics Management, Vol. 14, No. 1, pp. 1-17.
    • (2003) International Journal of Logistics Management , vol.14 , Issue.1 , pp. 1-17
    • McFarlane, D.1    Sheffi, Y.2
  • 18
    • 84969346266 scopus 로고
    • A certified digital signature
    • CA, ACM, Santa Barbara
    • Merkle, R.C. (1989) 'A certified digital signature', Proceedings on Advances in Cryptology, CA, ACM, Santa Barbara, pp. 218-238.
    • (1989) Proceedings on Advances in Cryptology , pp. 218-238
    • Merkle, R.C.1
  • 19
    • 78649863388 scopus 로고    scopus 로고
    • Data classification process for security and privacy based on a fuzzy logic classifier
    • Mohammadian, M. and Hatzinakos, D. (2009) 'Data classification process for security and privacy based on a fuzzy logic classifier', International Journal of Electronic Finance, Vol. 3, No. 4, pp. 374-386.
    • (2009) International Journal of Electronic Finance , vol.3 , Issue.4 , pp. 374-386
    • Mohammadian, M.1    Hatzinakos, D.2
  • 25
    • 79957516720 scopus 로고    scopus 로고
    • A data model for processing financial market and news data
    • Rabhi, F., Guabtni, A. and Yao, L. (2009) 'A data model for processing financial market and news data', International Journal of Electronic Finance, Vol. 3, No. 4, pp. 387-403.
    • (2009) International Journal of Electronic Finance , vol.3 , Issue.4 , pp. 387-403
    • Rabhi, F.1    Guabtni, A.2    Yao, L.3
  • 26
    • 84947547225 scopus 로고    scopus 로고
    • Experiences with specification-based intrusion detection
    • LNCS 2212, Springer
    • Uppuluri, P. and Sekar, R. (2001) 'Experiences with specification-based intrusion detection', Recent Advances in Intrusion Detection, LNCS 2212, Springer, pp. 172-189.
    • (2001) Recent Advances in Intrusion Detection , pp. 172-189
    • Uppuluri, P.1    Sekar, R.2
  • 27
    • 3943071545 scopus 로고    scopus 로고
    • US vulnerable to cyerterrorism
    • Wehde, E. (1998) 'US vulnerable to cyerterrorism', Computer Fruad & Security, Vol. 6, No. 1, pp. 6, 7.
    • (1998) Computer Fruad & Security , vol.6 , Issue.1 , pp. 6-7
    • Wehde, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.