메뉴 건너뛰기




Volumn 26, Issue 6, 2011, Pages 22-30

Stealing reality: When criminals become data scientists (or vice versa)

Author keywords

advanced persistent threat; intelligent systems; malware; mobile networks security; social and economic computing; stealth attacks

Indexed keywords

ADVANCED PERSISTENT THREAT; MALWARES; MOBILE NETWORKS SECURITY; SOCIAL AND ECONOMIC COMPUTING; STEALTH ATTACKS;

EID: 83655202879     PISSN: 15411672     EISSN: None     Source Type: Journal    
DOI: 10.1109/MIS.2011.78     Document Type: Article
Times cited : (26)

References (22)
  • 2
    • 81255149250 scopus 로고    scopus 로고
    • Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
    • T. Moore, D. Pym, and C. Ioannidis, eds., Springer
    • C. Herley and D. Florencio, "Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy," Economics of Information Security and Privacy, T. Moore, D. Pym, and C. Ioannidis, eds., Springer, 2010, pp. 33-53.
    • (2010) Economics of Information Security and Privacy , pp. 33-53
    • Herley, C.1    Florencio, D.2
  • 6
    • 78349265788 scopus 로고    scopus 로고
    • Toward predicting collective behavior via social dimension extraction
    • L. Tang and H. Liu, "Toward Predicting Collective Behavior via Social Dimension Extraction," IEEE Intelligent Systems, vol. 35, no. 5, 2010, pp. 19-25.
    • (2010) IEEE Intelligent Systems , vol.35 , Issue.5 , pp. 19-25
    • Tang, L.1    Liu, H.2
  • 7
    • 79951592132 scopus 로고    scopus 로고
    • Deductive and inductive stream reasoning for semantic social media analytics
    • D. Barbieri et al., "Deductive and Inductive Stream Reasoning for Semantic Social Media Analytics," IEEE Intelligent Systems, vol. 25, no. 6, 2010, pp. 32-41.
    • (2010) IEEE Intelligent Systems , vol.25 , Issue.6 , pp. 32-41
    • Barbieri, D.1
  • 8
    • 84855275682 scopus 로고    scopus 로고
    • Israel poised to pass National I.D. database law
    • N. Jeffay, "Israel Poised to Pass National I.D. Database Law," The Jewish Daily Forward, 2009; www.forward. com/articles/112033.
    • (2009) The Jewish Daily Forward
    • Jeffay, N.1
  • 9
    • 84855287477 scopus 로고    scopus 로고
    • Privacy fears over gay teenage database
    • D. Emery, "Privacy Fears over Gay Teenage Database," BBC News, 2010; www.bbc.co.uk/news/10612800.
    • (2010) BBC News
    • Emery, D.1
  • 15
    • 77958594601 scopus 로고    scopus 로고
    • Social network sensors for early detection of contagious outbreaks
    • N.A. Christakis and J.H. Fowler, "Social Network Sensors for Early Detection of Contagious Outbreaks," PLoS ONE, vol. 5, 2010, p. e12948.
    • (2010) PLoS ONE , vol.5
    • Christakis, N.A.1    Fowler, J.H.2
  • 16
    • 0001902056 scopus 로고
    • Three approaches to the quantitative definition of information
    • A. Kolmogorov, "Three Approaches to the Quantitative Definition of Information," Problems Information Transmission, vol. 1, no. 1, 1965, pp. 1-7.
    • (1965) Problems Information Transmission , vol.1 , Issue.1 , pp. 1-7
    • Kolmogorov, A.1
  • 17
    • 78650008157 scopus 로고    scopus 로고
    • Social sensing for epidemiological behavior change
    • ACM Press
    • A. Madan et al., "Social Sensing for Epidemiological Behavior Change," Proc. 12th ACM Int'l Conf. Ubiquitous Computing, ACM Press, 2010, pp. 291-300.
    • (2010) Proc. 12th ACM Int'l Conf. Ubiquitous Computing , pp. 291-300
    • Madan, A.1
  • 18
    • 70349313631 scopus 로고    scopus 로고
    • Inferring social network structure using mobile phone data
    • N. Eagle, A. Pentland, and D. Lazer, "Inferring Social Network Structure Using Mobile Phone Data," Proc. Nat'l Academy of Sciences, vol. 106, no. 36, 2009, pp. 15274-15278.
    • (2009) Proc. Nat'l Academy of Sciences , vol.106 , Issue.36 , pp. 15274-15278
    • Eagle, N.1    Pentland, A.2    Lazer, D.3
  • 19
    • 80054080566 scopus 로고    scopus 로고
    • The social fMRI: Measuring, understanding, and designing social mechanisms in the real world
    • ACM Press
    • N. Aharony et al., "The Social fMRI: Measuring, Understanding, and Designing Social Mechanisms in the Real World," Proc. 13th ACM Int'l Conf. Ubiquitous Computing (Ubicomp), ACM Press, 2011, pp. 445-454.
    • (2011) Proc. 13th ACM Int'l Conf. Ubiquitous Computing (Ubicomp) , pp. 445-454
    • Aharony, N.1
  • 20
    • 0742276097 scopus 로고    scopus 로고
    • Inside the slammer worm
    • D. Moore et al., "Inside the Slammer Worm," IEEE Security & Privacy, vol. 1, no. 4, 2003, pp. 33-39.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.4 , pp. 33-39
    • Moore, D.1
  • 21
    • 84958983572 scopus 로고    scopus 로고
    • Detecting malicious software by monitoring anomalous windows registry accesses
    • Springer
    • F. Apap et al., "Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses," Recent Advances in Intrusion Detection, Springer, 2002, pp. 36-53.
    • (2002) Recent Advances in Intrusion Detection , pp. 36-53
    • Apap, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.