메뉴 건너뛰기




Volumn 55, Issue 3, 2012, Pages 66-73

A comparative study of cyberattacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPARATIVE STUDIES; CYBER-ATTACKS;

EID: 84863267311     PISSN: 00010782     EISSN: 15577317     Source Type: Journal    
DOI: 10.1145/2093548.2093568     Document Type: Article
Times cited : (39)

References (16)
  • 1
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security
    • DOI 10.1126/science.1130992
    • Anderson, R. and Moore, T. The economics of information security. Science 314, 5799 (Oct. 27, 2006), 610-613. (Pubitemid 44646376)
    • (2006) Science , vol.314 , Issue.5799 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 5
    • 36348991544 scopus 로고    scopus 로고
    • International actions against cybercrime: Networking legal systems in the networked crime scene
    • sept
    • Li, X. International actions against cybercrime: Networking legal systems in the networked crime scene. Webology 4, 3 (sept. 2007); http://www.webology. org/2007/v4n3/a45.html
    • (2007) Webology , vol.4 , Issue.3
    • Li, X.1
  • 6
    • 0036025767 scopus 로고    scopus 로고
    • New economics of sociological criminology
    • McCarthy, B. New economics of sociological criminology. Annual Review of Sociology 28 (2002), 417-442.
    • (2002) Annual Review of Sociology , vol.28 , pp. 417-442
    • McCarthy, B.1
  • 8
    • 84863259402 scopus 로고    scopus 로고
    • Border crossing: Fighting international cybercrime
    • sept
    • Moscaritolo, A. Border crossing: Fighting international cybercrime. SCMagazine (sept. 2009); http://www.scmagazine.com/border-crossing-fighting- international-cybercrime/article/148562/
    • (2009) SCMagazine
    • Moscaritolo, A.1
  • 9
    • 63349088117 scopus 로고    scopus 로고
    • The deterrent and displacement effects of information security enforcement: International evidence
    • Fall
    • Png, I.P.L., Wang, C.Y., and Wang, Q.H. The deterrent and displacement effects of information security enforcement: International evidence. Journal of Management Information Systems 25, 2 (Fall 2008), 125-144.
    • (2008) Journal of Management Information Systems , vol.25 , Issue.2 , pp. 125-144
    • Png, I.P.L.1    Wang, C.Y.2    Wang, Q.H.3
  • 10
    • 70449395022 scopus 로고    scopus 로고
    • Information security: Facilitating user precautions vis-A-vis enforcement against attackers
    • Fall
    • Png, I.P.L. and Wang, Q.H. Information security: Facilitating user precautions vis-a-vis enforcement against attackers. Journal of Management Information Systems 26, 2 (Fall 2009), 97-121.
    • (2009) Journal of Management Information Systems , vol.26 , Issue.2 , pp. 97-121
    • Png, I.P.L.1    Wang, Q.H.2
  • 12
    • 84863259401 scopus 로고    scopus 로고
    • Technical Report
    • Soldo, F. Predicting future attacks, Technical Report, 2009; http://www.ece.uci.edu/-athina/PAPERS/dshield-analysis-tr.pdf
    • (2009) Predicting Future Attacks
    • Soldo, F.1
  • 14
    • 84865248138 scopus 로고    scopus 로고
    • Symantec Corp White Paper Symantec, Mountain View, CA, Apr
    • Symantec Corp. Global Internet Security Threat Report: Trends for 2009, White Paper. Symantec, Mountain View, CA, Apr. 2010; http://www.symantec. com/business/threatreport/archive.jsp
    • (2010) Global Internet Security Threat Report: Trends for 2009
  • 15
    • 84871400671 scopus 로고    scopus 로고
    • Symantec Corp Trends for July 5-Dec. 5, White Paper Symantec, Mountain View, CA, Mar
    • Symantec Corp. Symantec Global Internet Security Threat Report: Trends for July 5-Dec. 5, White Paper Symantec, Mountain View, CA, Mar. 2006; http://www.symantec.com/business/threatreport/archive.jsp
    • (2006) Symantec Global Internet Security Threat Report


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.