-
1
-
-
33750440197
-
The economics of information security
-
DOI 10.1126/science.1130992
-
Anderson, R. and Moore, T. The economics of information security. Science 314, 5799 (Oct. 27, 2006), 610-613. (Pubitemid 44646376)
-
(2006)
Science
, vol.314
, Issue.5799
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
4
-
-
84863294620
-
Malicious hubs: Detecting abnormally malicious autonomous systems
-
san Diego, Mar. 15-19
-
Kalafut, A., Craig, S., and Gupta, M., Malicious hubs: Detecting abnormally malicious autonomous systems. In Proceedings of the 29th Conference on Computer Communications (san Diego, Mar. 15-19, 2010), 1-5.
-
(2010)
Proceedings of the 29th Conference on Computer Communications
, pp. 1-5
-
-
Kalafut, A.1
Craig, S.2
Gupta, M.3
-
5
-
-
36348991544
-
International actions against cybercrime: Networking legal systems in the networked crime scene
-
sept
-
Li, X. International actions against cybercrime: Networking legal systems in the networked crime scene. Webology 4, 3 (sept. 2007); http://www.webology. org/2007/v4n3/a45.html
-
(2007)
Webology
, vol.4
, Issue.3
-
-
Li, X.1
-
6
-
-
0036025767
-
New economics of sociological criminology
-
McCarthy, B. New economics of sociological criminology. Annual Review of Sociology 28 (2002), 417-442.
-
(2002)
Annual Review of Sociology
, vol.28
, pp. 417-442
-
-
McCarthy, B.1
-
7
-
-
75749102614
-
The economics of online crime
-
summer
-
Moore, T., Clayton, R., and Anderson, R. The economics of online crime. Journal of Economic Perspectives 23, 3 (summer 2009), 3-20.
-
(2009)
Journal of Economic Perspectives
, vol.23
, Issue.3
, pp. 3-20
-
-
Moore, T.1
Clayton, R.2
Anderson, R.3
-
8
-
-
84863259402
-
Border crossing: Fighting international cybercrime
-
sept
-
Moscaritolo, A. Border crossing: Fighting international cybercrime. SCMagazine (sept. 2009); http://www.scmagazine.com/border-crossing-fighting- international-cybercrime/article/148562/
-
(2009)
SCMagazine
-
-
Moscaritolo, A.1
-
9
-
-
63349088117
-
The deterrent and displacement effects of information security enforcement: International evidence
-
Fall
-
Png, I.P.L., Wang, C.Y., and Wang, Q.H. The deterrent and displacement effects of information security enforcement: International evidence. Journal of Management Information Systems 25, 2 (Fall 2008), 125-144.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.2
, pp. 125-144
-
-
Png, I.P.L.1
Wang, C.Y.2
Wang, Q.H.3
-
10
-
-
70449395022
-
Information security: Facilitating user precautions vis-A-vis enforcement against attackers
-
Fall
-
Png, I.P.L. and Wang, Q.H. Information security: Facilitating user precautions vis-a-vis enforcement against attackers. Journal of Management Information Systems 26, 2 (Fall 2009), 97-121.
-
(2009)
Journal of Management Information Systems
, vol.26
, Issue.2
, pp. 97-121
-
-
Png, I.P.L.1
Wang, Q.H.2
-
12
-
-
84863259401
-
-
Technical Report
-
Soldo, F. Predicting future attacks, Technical Report, 2009; http://www.ece.uci.edu/-athina/PAPERS/dshield-analysis-tr.pdf
-
(2009)
Predicting Future Attacks
-
-
Soldo, F.1
-
13
-
-
77950794331
-
FIRE: FInding rogue nEtworks
-
Honolulu, HI, Dec. 7-11
-
Stone-Gross, B., Kruegel, C., Almeroth, K., Moser, A., and Kirda, E. FIRE: FInding Rogue nEtworks. In Proceedings of the Annual Computer Security Applications Conference (Honolulu, HI, Dec. 7-11, 2009), 231-240.
-
(2009)
Proceedings of the Annual Computer Security Applications Conference
, pp. 231-240
-
-
Stone-Gross, B.1
Kruegel, C.2
Almeroth, K.3
Moser, A.4
Kirda, E.5
-
14
-
-
84865248138
-
-
Symantec Corp White Paper Symantec, Mountain View, CA, Apr
-
Symantec Corp. Global Internet Security Threat Report: Trends for 2009, White Paper. Symantec, Mountain View, CA, Apr. 2010; http://www.symantec. com/business/threatreport/archive.jsp
-
(2010)
Global Internet Security Threat Report: Trends for 2009
-
-
-
15
-
-
84871400671
-
-
Symantec Corp Trends for July 5-Dec. 5, White Paper Symantec, Mountain View, CA, Mar
-
Symantec Corp. Symantec Global Internet Security Threat Report: Trends for July 5-Dec. 5, White Paper Symantec, Mountain View, CA, Mar. 2006; http://www.symantec.com/business/threatreport/archive.jsp
-
(2006)
Symantec Global Internet Security Threat Report
-
-
|