-
1
-
-
84863385709
-
Cybercrime: Investigating High-Technology Computer Crime
-
Anderson Publishing: Cleveland, Mississippi
-
Moore R. Cybercrime: Investigating High-Technology Computer Crime. Anderson Publishing: Cleveland, Mississippi, 2005.
-
(2005)
-
-
Moore, R.1
-
2
-
-
84863363206
-
-
Cyber Crime Overview. Available from: [accessed on 25 April 2010]
-
Cyber Crime Overview. 2008. Available from: [accessed on 25 April 2010]
-
(2008)
-
-
-
3
-
-
84863366144
-
-
Cyber Forensics. Available from: [accessed on 25 April 2010]
-
Cyber Forensics. 2008. Available from: [accessed on 25 April 2010]
-
(2008)
-
-
-
4
-
-
84863344988
-
-
Cyber Crimes. April Available from: [accessed on 25 April 2010]
-
Cyber Crimes. April 2008. Available from: [accessed on 25 April 2010]
-
(2008)
-
-
-
6
-
-
72449209394
-
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
-
Englund H, Johansson T. Three ways to mount distinguishing attacks on irregularly clocked stream ciphers. International Journal of Security and Networks 2006; 1(1/2): 95-102.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 95-102
-
-
Englund, H.1
Johansson, T.2
-
7
-
-
44649095872
-
A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks
-
Karyotis V, Papavassiliou S, Grammatikou M, Maglaris V. A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks. International Journal of Security and Networks 2006; 1(3/4): 255-265.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 255-265
-
-
Karyotis, V.1
Papavassiliou, S.2
Grammatikou, M.3
Maglaris, V.4
-
9
-
-
77954341184
-
An approach to synthesise safe systems
-
Jhumka A, Freiling F, Fetzer C, Suri N. An approach to synthesise safe systems. International Journal of Security and Networks 2006; 1(1/2): 62-74.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 62-74
-
-
Jhumka, A.1
Freiling, F.2
Fetzer, C.3
Suri, N.4
-
10
-
-
84890880165
-
Limiting DoS attacks during multihop data delivery in wireless sensor networks
-
Deng J, Han R, Mishra S. Limiting DoS attacks during multihop data delivery in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4): 167-178.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 167-178
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
11
-
-
74549166520
-
Wireless networking security: open issues in trust, management, interoperation and measurement
-
Evans JB, Wang W, Ewy BJ. Wireless networking security: open issues in trust, management, interoperation and measurement. International Journal of Security and Networks 2006; 1(1/2): 84-94.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 84-94
-
-
Evans, J.B.1
Wang, W.2
Ewy, B.J.3
-
15
-
-
68149180871
-
Intrusion detection system for denial-of-service flooding attacks in SIP communication networks
-
Ehlert S, Rebahi Y, Magedanz T. Intrusion detection system for denial-of-service flooding attacks in SIP communication networks. International Journal of Security and Networks 2009; 4(3): 189-200.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 189-200
-
-
Ehlert, S.1
Rebahi, Y.2
Magedanz, T.3
-
16
-
-
77949692385
-
Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees
-
Dalton II GC, Edge KS, Mills RF, Raines RA. Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees. International Journal of Security and Networks 2010; 5(2/3): 87-95.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 87-95
-
-
Dalton II, G.C.1
Edge, K.S.2
Mills, R.F.3
Raines, R.A.4
-
17
-
-
79951648076
-
LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
-
Hsu H, Zhu S, Hurson AR. LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network. International Journal of Security and Networks 2007; 2(3/4): 202-215.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 202-215
-
-
Hsu, H.1
Zhu, S.2
Hurson, A.R.3
-
18
-
-
79551551587
-
Analysis of flow-correlation attacks in anonymity network
-
Zhu Y, Fu X, Bettati R, Zhao W. Analysis of flow-correlation attacks in anonymity network. International Journal of Security and Networks 2007; 2(1/2):137-153.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 137-153
-
-
Zhu, Y.1
Fu, X.2
Bettati, R.3
Zhao, W.4
-
19
-
-
61849085156
-
An evaluation of connection characteristics for separating network attacks
-
Berthier R, Cukier M. An evaluation of connection characteristics for separating network attacks. International Journal of Security and Networks 2009; 4(1/2): 110-124.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 110-124
-
-
Berthier, R.1
Cukier, M.2
-
20
-
-
79951685922
-
Editorial: security issues on sensor networks
-
Xiao Y, Jia X, Sun B, Du X. Editorial: security issues on sensor networks. International Journal of Security and Networks 2006; 1(3/4): 125-126.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 125-126
-
-
Xiao, Y.1
Jia, X.2
Sun, B.3
Du, X.4
-
22
-
-
49949107235
-
Load-balanced key establishment methodologies in wireless sensor networks
-
Araz O, Qi H. Load-balanced key establishment methodologies in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4): 158-166.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 158-166
-
-
Araz, O.1
Qi, H.2
-
23
-
-
79951716783
-
Low-power authenticated group key agreement for heterogeneous wireless networks
-
Teo J, Tan C, Ng J. Low-power authenticated group key agreement for heterogeneous wireless networks. International Journal of Security and Networks 2006; 1(3/4): 226-236.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 226-236
-
-
Teo, J.1
Tan, C.2
Ng, J.3
-
24
-
-
79551646922
-
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
-
Ling H, Znati T. End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks. International Journal of Security and Networks 2007; 2(1/2): 109-121.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 109-121
-
-
Ling, H.1
Znati, T.2
-
25
-
-
68149086398
-
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
-
Hoeper K, Gong G. Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4): 239-250.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 239-250
-
-
Hoeper, K.1
Gong, G.2
-
26
-
-
38049042723
-
On security proof of McCullagh-Barreto's key agreement protocol and its variants
-
Cheng Z, Chen L. On security proof of McCullagh-Barreto's key agreement protocol and its variants. International Journal of Security and Networks 2007; 2(3/4): 251-259.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 251-259
-
-
Cheng, Z.1
Chen, L.2
-
27
-
-
73549097586
-
Multilayer key establishment for large-scale sensor networks
-
Kotzanikolaou P, Vergados DD, Stergiou G, Magkos E. Multilayer key establishment for large-scale sensor networks. International Journal of Security and Networks 2008; 3(1): 1-9.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 1-9
-
-
Kotzanikolaou, P.1
Vergados, D.D.2
Stergiou, G.3
Magkos, E.4
-
28
-
-
79951619296
-
A novel conference key management solution for secure dynamic conferencing
-
Zou X, Karandikar Y. A novel conference key management solution for secure dynamic conferencing. International Journal of Security and Networks 2008; 3(1): 47-53.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 47-53
-
-
Zou, X.1
Karandikar, Y.2
-
29
-
-
77953145198
-
Adaptive clustering for scalable key management in dynamic group communications
-
Challal Y, Gharout S, Bouabdallah A, Bettahar H. Adaptive clustering for scalable key management in dynamic group communications. International Journal of Security and Networks 2008; 3(2): 133-146.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 133-146
-
-
Challal, Y.1
Gharout, S.2
Bouabdallah, A.3
Bettahar, H.4
-
30
-
-
79951661564
-
Secure user-identification and key distribution scheme preserving anonymity
-
Tripathy S, Nandi S. Secure user-identification and key distribution scheme preserving anonymity. International Journal of Security and Networks 2008; 3(3): 201-205.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 201-205
-
-
Tripathy, S.1
Nandi, S.2
-
31
-
-
79551645150
-
A one-way function based framework for pairwise key establishment in sensor networks
-
Ma L, Teymorian AY, Xing K, Du D. A one-way function based framework for pairwise key establishment in sensor networks. International Journal of Security and Networks 2008; 3(4): 217-225.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 217-225
-
-
Ma, L.1
Teymorian, A.Y.2
Xing, K.3
Du, D.4
-
32
-
-
79551628267
-
Clique-based group key assignment in wireless sensor networks
-
Srinivasan A, Li F, Wu J, Li M. Clique-based group key assignment in wireless sensor networks. International Journal of Security and Networks 2008; 3(4): 226-239.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 226-239
-
-
Srinivasan, A.1
Li, F.2
Wu, J.3
Li, M.4
-
33
-
-
61849158146
-
An efficient group key management scheme for mobile ad hoc networks
-
Wu B, Wu J, Dong Y. An efficient group key management scheme for mobile ad hoc networks. International Journal of Security and Networks 2009; 4(1/2): 125-134.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 125-134
-
-
Wu, B.1
Wu, J.2
Dong, Y.3
-
36
-
-
77949732329
-
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
-
Guo H, Mu Y, Zhang XY, Li ZJ. Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security. International Journal of Security and Networks 2010; 5(2/3): 173-187.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 173-187
-
-
Guo, H.1
Mu, Y.2
Zhang, X.Y.3
Li, Z.J.4
-
39
-
-
34547148771
-
8 Single packet IP traceback in AS-level partial deployment scenario
-
Korkmaz T, Gong C, Sarac K, Dykes SG. 8 Single packet IP traceback in AS-level partial deployment scenario. International Journal of Security and Networks 2007; 2(1/2): 95-10.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 95-10
-
-
Korkmaz, T.1
Gong, C.2
Sarac, K.3
Dykes, S.G.4
-
40
-
-
79951598312
-
Origins: an approach to trace fast spreading worms to their roots
-
Burt AL, Darschewski M, Ray I, Thurimella R, Wu H. Origins: an approach to trace fast spreading worms to their roots. International Journal of Security and Networks 2008; 3(1): 36-46.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 36-46
-
-
Burt, A.L.1
Darschewski, M.2
Ray, I.3
Thurimella, R.4
Wu, H.5
-
41
-
-
77949415724
-
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
-
Finnigin KM, Mullins BE, Raines RA, Potoczny HB. Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks. International Journal of Security and Networks 2007; 2(3/4): 260-271.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 260-271
-
-
Finnigin, K.M.1
Mullins, B.E.2
Raines, R.A.3
Potoczny, H.B.4
-
44
-
-
77955716028
-
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
-
Wang X. The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. International Journal of Security and Networks 2006; 1(3/4): 184-197.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 184-197
-
-
Wang, X.1
-
46
-
-
67649498303
-
Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
-
Liu Y, Comaniciu C, Man H. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection. International Journal of Security and Networks 2006; 1(3/4): 243-254.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 243-254
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
47
-
-
85086420396
-
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
-
Scheirer W, Chuah M. Syntax vs. semantics: competing approaches to dynamic network intrusion detection. International Journal of Security and Networks 2008; 3(1): 24-35.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 24-35
-
-
Scheirer, W.1
Chuah, M.2
-
48
-
-
72549101766
-
An agent-based framework for intrusion detection alert verification and event correlation
-
Uphoff B, Wong JS. An agent-based framework for intrusion detection alert verification and event correlation. International Journal of Security and Networks 2008; 3(3): 193-200.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 193-200
-
-
Uphoff, B.1
Wong, J.S.2
-
49
-
-
77949729303
-
Experimental analysis of application-level intrusion detection algorithms
-
Dong Y, Hsu S, Rajput S, Wu B. Experimental analysis of application-level intrusion detection algorithms. International Journal of Security and Networks 2010; 5(2/3): 198-205.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 198-205
-
-
Dong, Y.1
Hsu, S.2
Rajput, S.3
Wu, B.4
-
51
-
-
77949801623
-
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
-
Huang S, Shieh S. Authentication and secret search mechanisms for RFID-aware wireless sensor networks. International Journal of Security and Networks 2010; 5(1): 15-25.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 15-25
-
-
Huang, S.1
Shieh, S.2
-
52
-
-
77949864345
-
Lightweight authentication protocol for mobile RFID networks
-
Yang M. Lightweight authentication protocol for mobile RFID networks. International Journal of Security and Networks 2010; 5(1): 53-62.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 53-62
-
-
Yang, M.1
-
53
-
-
77949760270
-
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
-
Leng X, Lien Y, Mayes K, Markantonakis K. An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing. International Journal of Security and Networks 2010; 5(2/3): 79-86.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 79-86
-
-
Leng, X.1
Lien, Y.2
Mayes, K.3
Markantonakis, K.4
-
57
-
-
77949750049
-
A ubiquitous mobile telemedicine system for the elderly using RFID
-
Raad M. A ubiquitous mobile telemedicine system for the elderly using RFID. International Journal of Security and Networks 2010; 5(2/3): 156-164.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 156-164
-
-
Raad, M.1
-
58
-
-
79955980141
-
A lightweight encryption and authentication scheme for wireless sensor networks
-
Zheng J, Li J, Lee MJ, Anshel M. A lightweight encryption and authentication scheme for wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4): 138-146.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 138-146
-
-
Zheng, J.1
Li, J.2
Lee, M.J.3
Anshel, M.4
-
59
-
-
79951694028
-
Analysis of routing security-energy trade-offs in wireless sensor networks
-
Al-Karaki JN. Analysis of routing security-energy trade-offs in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4): 147-157.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 147-157
-
-
Al-Karaki, J.N.1
-
60
-
-
34548042117
-
On the design of secure protocols for hierarchical sensor networks
-
Oliveira LB, Wong H, Loureiro AAF, Dahab R. On the design of secure protocols for hierarchical sensor networks. International Journal of Security and Networks 2007; 2(3/4): 216-227.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 216-227
-
-
Oliveira, L.B.1
Wong, H.2
Loureiro, A.A.F.3
Dahab, R.4
-
61
-
-
84899740998
-
Visualisation of wormholes in underwater sensor networks: a distributed approach
-
Wang W, Kong J, Bhargava B, Gerla M. Visualisation of wormholes in underwater sensor networks: a distributed approach. International Journal of Security and Networks 2008; 3(1): 10-23.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 10-23
-
-
Wang, W.1
Kong, J.2
Bhargava, B.3
Gerla, M.4
-
62
-
-
77954327354
-
PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks
-
Li F, Srinivasan A, Wu J. PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks. International Journal of Security and Networks 2008; 3(3): 173-182.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 173-182
-
-
Li, F.1
Srinivasan, A.2
Wu, J.3
-
63
-
-
77949844099
-
An efficient secure data dissemination scheme for grid structure wireless sensor networks
-
Hsiao Y, Hwang R. An efficient secure data dissemination scheme for grid structure wireless sensor networks. International Journal of Security and Networks 2010; 5(1): 26-34.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 26-34
-
-
Hsiao, Y.1
Hwang, R.2
-
64
-
-
77949830969
-
A cross-layer authentication design for secure video transportation in wireless sensor network
-
Wang J, Smith GL. A cross-layer authentication design for secure video transportation in wireless sensor network. International Journal of Security and Networks 2010; 5(1): 63-76.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 63-76
-
-
Wang, J.1
Smith, G.L.2
-
66
-
-
79951662876
-
Towards a realistic testbed for wireless network reliability and security performance studies
-
Hu F, Rughoonundon A, Celentano L. Towards a realistic testbed for wireless network reliability and security performance studies. International Journal of Security and Networks 2008; 3(1): 63-77.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 63-77
-
-
Hu, F.1
Rughoonundon, A.2
Celentano, L.3
-
67
-
-
51849141536
-
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
-
Lin X, Ling X, Zhu H, Ho P, Shen X. A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks. International Journal of Security and Networks 2008; 3(2): 122-132.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 122-132
-
-
Lin, X.1
Ling, X.2
Zhu, H.3
Ho, P.4
Shen, X.5
-
68
-
-
79551651366
-
Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks
-
Kandikattu R, Jacob L. Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks. International Journal of Security and Networks 2008; 3(4): 258-274.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 258-274
-
-
Kandikattu, R.1
Jacob, L.2
-
69
-
-
61849158147
-
Designing user studies for security applications: a case study with wireless network configuration
-
Kuo C, AC Perrig, Walker J. Designing user studies for security applications: a case study with wireless network configuration. International Journal of Security and Networks 2009; 4(1/2): 101-109.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 101-109
-
-
Kuo, C.1
Perrig, A.C.2
Walker, J.3
-
71
-
-
77949835881
-
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
-
Xu L, Chen S, Huang X, Mu Y. Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks. International Journal of Security and Networks 2010; 5(1): 35-44.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 35-44
-
-
Xu, L.1
Chen, S.2
Huang, X.3
Mu, Y.4
-
72
-
-
74549116861
-
Securing Wi-Fi networks with position verification: extended version
-
Malaney RA. Securing Wi-Fi networks with position verification: extended version. International Journal of Security and Networks 2007; 2(1/2): 27-36.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 27-36
-
-
Malaney, R.A.1
-
76
-
-
79951639076
-
Editorial
-
Mu Y, Chen L, Chen X, Gong G, Lee P, A Miyaji, et al. Editorial. International Journal of Security and Networks 2007; 2(3/4): 171-174.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 171-174
-
-
Mu, Y.1
Chen, L.2
Chen, X.3
Gong, G.4
Lee, P.5
Miyaji, A.6
-
77
-
-
85016433011
-
Efficient multicast stream authentication for the fully adversarial network model
-
Tartary C, Wang H. Efficient multicast stream authentication for the fully adversarial network model. International Journal of Security and Networks 2007; 2(3/4): 175-191.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 175-191
-
-
Tartary, C.1
Wang, H.2
-
78
-
-
51249122792
-
A self-encryption authentication protocol for teleconference services
-
Jiang Y, Lin C, Shi M, Shen X. A self-encryption authentication protocol for teleconference services. International Journal of Security and Networks 2006; 1(3/4): 198-205.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 198-205
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen, X.4
-
79
-
-
79951638712
-
Strong password-based authentication in TLS using the three-party group Diffie-Hellman protocol
-
Abdalla M, Bresson E, Chevassut O, Moller B, Pointcheval D. Strong password-based authentication in TLS using the three-party group Diffie-Hellman protocol. International Journal of Security and Networks 2007; 2(3/4): 284-296.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 284-296
-
-
Abdalla, M.1
Bresson, E.2
Chevassut, O.3
Moller, B.4
Pointcheval, D.5
-
82
-
-
61849163799
-
Proximity-based authentication of mobile devices
-
Scannell A, Varshavsky A, LaMarca A, de Lara E. Proximity-based authentication of mobile devices. International Journal of Security and Networks 2009; 4(1/2): 4-16.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 4-16
-
-
Scannell, A.1
Varshavsky, A.2
LaMarca, A.3
de Lara, E.4
-
85
-
-
68149158275
-
An efficient one-time password authentication scheme using a smart card
-
Lee S, Sivalingam KM. An efficient one-time password authentication scheme using a smart card. International Journal of Security and Networks 2009; 4(3): 145-152.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 145-152
-
-
Lee, S.1
Sivalingam, K.M.2
-
87
-
-
77949817850
-
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
-
Tsai K, Hsu C, Wu T. Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks. International Journal of Security and Networks 2010; 5(1): 45-52.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 45-52
-
-
Tsai, K.1
Hsu, C.2
Wu, T.3
-
88
-
-
78650637965
-
An FPGA-based system for tracking digital information transmitted via peer-to-peer protocols
-
Schrader KR, Mullins BE, Peterson GL, Mills RF. An FPGA-based system for tracking digital information transmitted via peer-to-peer protocols. International Journal of Security and Networks 2010; 5(4): 236-247.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 236-247
-
-
Schrader, K.R.1
Mullins, B.E.2
Peterson, G.L.3
Mills, R.F.4
-
90
-
-
54249117650
-
Secure scalable group signature with dynamic joins and separable authorities
-
Kiayias A, Yung M. Secure scalable group signature with dynamic joins and separable authorities. International Journal of Security and Networks 2006; 1(1/2): 24-45.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 24-45
-
-
Kiayias, A.1
Yung, M.2
-
92
-
-
37849002205
-
End-to-end security mechanisms for SMS
-
Hwu J, Hsu S, Lin Y-B, Chen R. End-to-end security mechanisms for SMS. International Journal of Security and Networks 2006; 1(3/4): 177-183.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 177-183
-
-
Hwu, J.1
Hsu, S.2
Lin, Y.-B.3
Chen, R.4
-
94
-
-
77954644745
-
A new signature scheme without random oracles
-
Tan C. A new signature scheme without random oracles. International Journal of Security and Networks 2006; 1(3/4): 237-242.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 237-242
-
-
Tan, C.1
-
95
-
-
79551652560
-
DKMS: distributed hierarchical access control for multimedia networks
-
Li R, Li J, Chen H. DKMS: distributed hierarchical access control for multimedia networks. International Journal of Security and Networks 2007; 2(1/2): 3-10.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 3-10
-
-
Li, R.1
Li, J.2
Chen, H.3
-
96
-
-
74049111426
-
Hash-AV: fast virus signature scanning by cache-resident filters
-
Erdogan O, Cao P. Hash-AV: fast virus signature scanning by cache-resident filters. International Journal of Security and Networks 2007; 2(1/2): 50-59.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 50-59
-
-
Erdogan, O.1
Cao, P.2
-
97
-
-
79551643767
-
Secure message delivery in publish/subscribe networks using overlay multicast
-
Rabinovich P, Simon R. Secure message delivery in publish/subscribe networks using overlay multicast. International Journal of Security and Networks 2007; 2(1/2): 60-70.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 60-70
-
-
Rabinovich, P.1
Simon, R.2
-
98
-
-
34548366188
-
Optimal worm-scanning method using vulnerable-host distributions
-
Chen Z, Ji C. Optimal worm-scanning method using vulnerable-host distributions. International Journal of Security and Networks 2007; 2(1/2): 71-80.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 71-80
-
-
Chen, Z.1
Ji, C.2
-
100
-
-
74549177130
-
Defence against packet injection in ad hoc networks
-
Gu Q, Liu P, Chu C, Zhu S. Defence against packet injection in ad hoc networks. International Journal of Security and Networks 2007; 2(1/2): 154-169.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 154-169
-
-
Gu, Q.1
Liu, P.2
Chu, C.3
Zhu, S.4
-
102
-
-
79951645452
-
Server side hashing core exceeding 3 Gbps of throughput
-
Michail HE, Panagiotakopoulos GA, Thanasoulis VN, Kakarountas AP, Goutis CE. Server side hashing core exceeding 3 Gbps of throughput. International Journal of Security and Networks 2007; 2(3/4): 228-238.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 228-238
-
-
Michail, H.E.1
Panagiotakopoulos, G.A.2
Thanasoulis, V.N.3
Kakarountas, A.P.4
Goutis, C.E.5
-
103
-
-
66249092571
-
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
-
Huang D. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4): 272-283.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 272-283
-
-
Huang, D.1
-
104
-
-
77955714466
-
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
-
Ray I, Poolsappasit N. Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. International Journal of Security and Networks 2008; 3(2): 80-94.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 80-94
-
-
Ray, I.1
Poolsappasit, N.2
-
105
-
-
70149104596
-
Forensic analysis of SCADA systems and networks
-
Kilpatrick T, Gonzalez J, Chandia R, Papa M, Shenoi S. Forensic analysis of SCADA systems and networks. International Journal of Security and Networks 2008; 3(2): 95-102.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 95-102
-
-
Kilpatrick, T.1
Gonzalez, J.2
Chandia, R.3
Papa, M.4
Shenoi, S.5
-
109
-
-
79951637895
-
Firewall filtering rules analysis for anomalies detection
-
Bouhoula A, Trabelsi Z, Barka E, Benelbahri M. Firewall filtering rules analysis for anomalies detection. International Journal of Security and Networks 2008; 3(3): 161-172.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 161-172
-
-
Bouhoula, A.1
Trabelsi, Z.2
Barka, E.3
Benelbahri, M.4
-
111
-
-
77952481544
-
ID-based threshold proxy signcryption scheme from bilinear pairings
-
Li F, Xin X, Hu Y. ID-based threshold proxy signcryption scheme from bilinear pairings. International Journal of Security and Networks 2008; 3(3): 206-215.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 206-215
-
-
Li, F.1
Xin, X.2
Hu, Y.3
-
112
-
-
77953193668
-
NTP-DownloadT: a conformance test tool for secured mobile download services
-
Hsieh C, Chen J, Lin Y-B, Chen K, Liao H, Liang C. NTP-DownloadT: a conformance test tool for secured mobile download services. International Journal of Security and Networks 2008; 3(4): 240-249.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 240-249
-
-
Hsieh, C.1
Chen, J.2
Lin, Y.-B.3
Chen, K.4
Liao, H.5
Liang, C.6
-
116
-
-
61849134762
-
Secure pairing with biometrics
-
Buhan I, Boom B, Doumen J, Hartel PH, Veldhuis RNJ. Secure pairing with biometrics. International Journal of Security and Networks 2009; 4(1/2): 27-42.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 27-42
-
-
Buhan, I.1
Boom, B.2
Doumen, J.3
Hartel, P.H.4
Veldhuis, R.N.J.5
-
117
-
-
61849184822
-
Using audio in secure device pairing
-
Goodrich MT, Sirivianos M, Solis J, Soriente C, Tsudik G, Uzun E. Using audio in secure device pairing. International Journal of Security and Networks 2009; 4(1/2): 57-68.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 57-68
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Soriente, C.4
Tsudik, G.5
Uzun, E.6
-
121
-
-
70349969846
-
A proactive secret sharing scheme in matrix projection method
-
Bai L, Zou X. A proactive secret sharing scheme in matrix projection method. International Journal of Security and Networks 2009; 4(4): 201-209.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 201-209
-
-
Bai, L.1
Zou, X.2
-
122
-
-
70349968221
-
Handling inheritance violation for secure interoperation of heterogeneous systems
-
Huang H, Kirchner H, Liu S, Wu W. Handling inheritance violation for secure interoperation of heterogeneous systems. International Journal of Security and Networks 2009; 4(4): 223-233.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 223-233
-
-
Huang, H.1
Kirchner, H.2
Liu, S.3
Wu, W.4
-
123
-
-
70349949111
-
Visibility: a novel concept for characterising provable network digital evidences
-
Rekhis S, Boudriga NA. Visibility: a novel concept for characterising provable network digital evidences. International Journal of Security and Networks 2009; 4(4): 234-245.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 234-245
-
-
Rekhis, S.1
Boudriga, N.A.2
-
128
-
-
77949694146
-
Security and privacy on low-cost radio frequency identification systems
-
Sun L. Security and privacy on low-cost radio frequency identification systems. International Journal of Security and Networks 2010; 5(2/3): 128-134.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 128-134
-
-
Sun, L.1
-
130
-
-
77949666177
-
Perceived barriers to the widespread commercial use of radio frequency identification technology
-
Rodrigues MJ, James K. Perceived barriers to the widespread commercial use of radio frequency identification technology. International Journal of Security and Networks 2010; 5(2/3): 165-172.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 165-172
-
-
Rodrigues, M.J.1
James, K.2
-
132
-
-
4344633220
-
-
Routledge Cavendish: London, ISBN 1859417760. [retrieved on 20 June 2008]
-
Bantekas I, Nash S. International Criminal Law 2/E, Routledge Cavendish: London, 2003. ISBN 1859417760. [retrieved on 20 June 2008]
-
(2003)
International Criminal Law 2/E
-
-
Bantekas, I.1
Nash, S.2
-
133
-
-
84863366149
-
-
Copyright. Available from: [accessed on 25 April]
-
Copyright. Available from: [accessed on 25 April 2010]
-
(2010)
-
-
-
134
-
-
84863363217
-
-
Copyright infringement. Available from: [accessed on 25 April]
-
Copyright infringement. Available from: [accessed on 25 April 2010]
-
(2010)
-
-
-
135
-
-
84863363216
-
-
SCO-Linux controversies. Available from: [accessed on 25 April]
-
SCO-Linux controversies. Available from: [accessed on 25 April 2010]
-
(2010)
-
-
-
136
-
-
84863371374
-
-
Spam (electronic). Available from: [accessed on 25 April]
-
Spam (electronic). Available from: [accessed on 25 April 2010]
-
(2010)
-
-
-
137
-
-
84863391134
-
-
Crist Announces First Case Under Florida Anti-Spam Law. Available from: [accessed on 25 April]
-
Crist Announces First Case Under Florida Anti-Spam Law. Available from: [accessed on 25 April 2010]
-
(2010)
-
-
-
138
-
-
84863385718
-
-
Crist: Judgment Ends Duo's Illegal Spam, Internet Operations. Available from: [accessed on 25 April]
-
Crist: Judgment Ends Duo's Illegal Spam, Internet Operations. Available from: [accessed on 25 April 2010]
-
(2010)
-
-
-
139
-
-
84863363219
-
-
Businessman wins e-mail spam case. Available from: [accessed on 25 April]
-
Businessman wins e-mail spam case. Available from: [accessed on 25 April 2010]
-
(2010)
-
-
-
140
-
-
84947616106
-
-
Scotsman wins £1,300 settlement against spammer. March Available from: [retrieved on 25 April 2010]
-
Leyden J. Scotsman wins £1, 300 settlement against spammer. March 2007. Available from: [retrieved on 25 April 2010]
-
(2007)
-
-
Leyden, J.1
-
141
-
-
84863391135
-
-
One of world's top 10 spammers held in Seattle. Available from: [accessed on 25 April]
-
One of world's top 10 spammers held in Seattle. Available from: [accessed on 25 April 2010]
-
(2010)
-
-
-
142
-
-
77950675112
-
Google Android
-
Los Alamitos, CA, USA: IEEE Computer Society
-
Yuval F, Uri K, Yuval E, Shlomi D, and Chanan G. Google Android: A Comprehensive Security Assessment. In the proceeding of IEEE Security and Privacy, Los Alamitos, CA, USA: IEEE Computer Society 2010; 8(2): 35-44.
-
(2010)
A Comprehensive Security Assessment. In the proceeding of IEEE Security and Privacy
, vol.8
, Issue.2
, pp. 35-44
-
-
Yuval, F.1
Uri, K.2
Yuval, E.3
Shlomi, D.4
Chanan, G.5
-
143
-
-
84863363218
-
-
Cyber Security Tip ST04-015. United States Computer Emergency Readiness Team. Available from: [retrieved on 2 May 2008]
-
McDowell M. Cyber Security Tip ST04-015. United States Computer Emergency Readiness Team. 2008. Available from: [retrieved on 2 May 2008]
-
(2008)
-
-
McDowell, M.1
-
144
-
-
84863385716
-
-
January 2001 thread on the UNISOG mailing list. Available from: [retrieved on 20 June]
-
January 2001 thread on the UNISOG mailing list. Available from: [retrieved on 20 June 2008]
-
(2008)
-
-
-
145
-
-
84863366151
-
-
Massive DDoS Attack Hit DNS Root Servers. October Available from: [accessed on 25 April 2010]
-
Naraine R. Massive DDoS Attack Hit DNS Root Servers. October 2002. Available from: [accessed on 25 April 2010]
-
(2002)
-
-
Naraine, R.1
-
146
-
-
79960090011
-
Detection and Classification of DDoS Attacks Using Machine Learning Algorithms
-
Subbulakshmi T, Mercy Shalinie S, and Ramamoorthi A. Detection and Classification of DDoS Attacks Using Machine Learning Algorithms, European Journal of Scientific Research 2010, 47(3): 334-346.
-
(2010)
European Journal of Scientific Research
, vol.47
, Issue.3
, pp. 334-346
-
-
Subbulakshmi, T.1
Mercy Shalinie, S.2
Ramamoorthi, A.3
-
147
-
-
84863366153
-
-
The Internets Are Going to War. January Available from: [accessed on 25 April 2010]
-
Landers C, The Internets Are Going to War. January 2008. Available from: [accessed on 25 April 2010]
-
(2008)
-
-
Landers, C.1
-
148
-
-
84863366150
-
-
Available from: [retrieved on 20 June]
-
Available from: [retrieved on 20 June 2008]
-
(2008)
-
-
-
149
-
-
84863366154
-
-
Penalty for Computer Contamination. Joint Commission on Technology and Science. Available from: [retrieved on 17 September]
-
Penalty for Computer Contamination. Joint Commission on Technology and Science. Available from: [retrieved on 17 September 2010]
-
(2010)
-
-
-
151
-
-
84863371378
-
-
Beware: Hackers at play. Newsweek, 5 September -, retrieved on 20 June 2008]
-
Beware: Hackers at play. Newsweek, 5 September 1983: 42-46, 48 [retrieved on 20 June 2008]
-
(1983)
, vol.48
, pp. 42-46
-
-
-
152
-
-
0021201312
-
Attacks on computers: congressional hearings and pending legislation
-
Oakland, CA, USA, 29 April-2 May 1984. IEEE Press: New York
-
Bailey D. Attacks on computers: congressional hearings and pending legislation. In IEEE Symposium on Security and Privacy, Oakland, CA, USA, 29 April-2 May 1984. IEEE Press: New York, 1984; 180-187.
-
(1984)
IEEE Symposium on Security and Privacy
, pp. 180-187
-
-
Bailey, D.1
-
153
-
-
84863385722
-
-
Recognized hackers. April Available from: [accessed on 25 April 2008]
-
Recognized hackers. April 2007. Available from: [accessed on 25 April 2008]
-
(2007)
-
-
-
154
-
-
84863391139
-
-
The Robert Morris Internet Worm. Available from: Retrieved August 23, 2008. [accessed on 25 April 2010]
-
Kehoe B.P. The Robert Morris Internet Worm. 2007. Available from: Retrieved August 23, 2008. [accessed on 25 April 2010]
-
(2007)
-
-
Kehoe, B.P.1
-
155
-
-
84863371380
-
-
Available from: [accessed on 25 April]
-
Jason Burks Available from: [accessed on 25 April 2010]
-
(2010)
-
-
Burks, J.1
-
156
-
-
84863366158
-
-
Convicted Computer Hackers. Available from: [accessed on 25 April]
-
Convicted Computer Hackers. Available from: [accessed on 25 April 2010]
-
(2010)
-
-
-
158
-
-
84863385721
-
-
The Origins of Phreaking. Blacklisted! 411. April Available from: Retrieved 2008-06-21. [accessed on 25 April 2010]
-
Robson G.D. The Origins of Phreaking. Blacklisted! 411. April 2004. Available from: Retrieved 2008-06-21. [accessed on 25 April 2010]
-
(2004)
-
-
Robson, G.D.1
-
159
-
-
55849103022
-
Pushbutton Calling with a Two-Group Voice-Frequency Code
-
Available from:
-
Schenker L. Pushbutton Calling with a Two-Group Voice-Frequency Code, The Bell system technical journal 1960; 39(1): 235-255. Available from:
-
(1960)
The Bell system technical journal.
, vol.39
, Issue.1
, pp. 235-255
-
-
Schenker, L.1
-
160
-
-
84863391145
-
-
Phreaking. Available from: [accessed on 25 April]
-
Phreaking. Available from: [accessed on 25 April 2010]
-
(2010)
-
-
-
161
-
-
34848911641
-
-
Social Phishing. Communications of the ACM. October Available from: [Retrieved on 3 June 2006]
-
Jagatic T, Johnson N, Jakobsson M, and Menczer F. Social Phishing. Communications of the ACM. October 2007. Available from: [Retrieved on 3 June 2006]
-
(2007)
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
162
-
-
84863366162
-
Phishing and Spamming via IM (SPIM). Internet Storm Center.
-
Available from: [retrieved on 5 December 2006]
-
Koon T. Phishing and Spamming via IM (SPIM). Internet Storm Center. 2006. Available from: [retrieved on 5 December 2006]
-
(2006)
-
-
Koon, T.1
-
163
-
-
84947615672
-
System security: a hacker's perspective
-
Felix J, Hauck C. System security: a hacker's perspective. Interex Proceedings, 1987; 1: 6.
-
(1987)
Interex Proceedings
, vol.1
, pp. 6
-
-
Felix, J.1
Hauck, C.2
-
164
-
-
84863391147
-
-
Identity theft. Available from: [retrieved on 25 April]
-
Identity theft. Available from: [retrieved on 25 April 2010]
-
(2010)
-
-
-
165
-
-
84863366164
-
-
Identity Theft. McAfee White Paper January Available from:
-
Paget F. Identity Theft. McAfee White Paper January 2007. Available from:
-
(2007)
-
-
Paget, F.1
-
166
-
-
84863371381
-
-
Trojans fuel ID theft boom. January Available from: [accessed 25 April 2010]
-
Leyden J. Trojans fuel ID theft boom. January 2007. Available from: [accessed 25 April 2010]
-
(2007)
-
-
Leyden, J.1
-
167
-
-
84863391146
-
-
Identity Theft. Available from: [accessed 25 April]
-
Paget F. Identity Theft. Available from: [accessed 25 April 2010]
-
(2010)
-
-
Paget, F.1
-
168
-
-
84863371383
-
-
325 000 names on terror list. Available from: [accessed 25 April]
-
325 000 names on terror list. Available from: [accessed 25 April 2010]
-
(2010)
-
-
-
169
-
-
0028458027
-
Current Information on the Scope and Nature of Child Sexual Abuse
-
Sum-Fall.
-
Finkelhor D. Current Information on the Scope and Nature of Child Sexual Abuse. Future of Children (Sum-Fall 1994); 4(2): 31-53.
-
(1994)
Future of Children
, vol.4
, Issue.2
, pp. 31-53
-
-
Finkelhor, D.1
-
170
-
-
84863371397
-
Child porn is being 'normalised' by panic merchants
-
January 12
-
Hume M. Child porn is being 'normalised' by panic merchants. The Times. January 12, 2004.
-
(2004)
The Times
-
-
Hume, M.1
-
171
-
-
40049108338
-
Online "Predators" and Their Victims
-
February.
-
Wolak J, Finkehor D, Mitchell K, Ybarra M. Online "Predators" and Their Victims. American Psychologist February 2008; 63(2): 111-128.
-
(2008)
American Psychologist
, vol.63
, Issue.2
, pp. 111-128
-
-
Wolak, J.1
Finkehor, D.2
Mitchell, K.3
Ybarra, M.4
-
172
-
-
40049108338
-
Online "predators" and their victims: Myths, realities, and implications for prevention and treatment
-
Wolak J, Finkelhor D, Mitchell K, Ybarra ML. Online "predators" and their victims: Myths, realities, and implications for prevention and treatment. American Psychologist 2008; 63(2): 111-128.
-
(2008)
American Psychologist
, vol.63
, Issue.2
, pp. 111-128
-
-
Wolak, J.1
Finkelhor, D.2
Mitchell, K.3
Ybarra, M.L.4
-
173
-
-
84863385744
-
-
Online gambling. Available from: Online-gambling#cite-note-9 [accessed 25 April]
-
Online gambling. Available from: Online-gambling#cite-note-9 [accessed 25 April 2010]
-
(2010)
-
-
-
174
-
-
84863366178
-
-
Legality of online gambling. Available from: [accessed 25 April]
-
Legality of online gambling. Available from: [accessed 25 April 2010]
-
(2010)
-
-
-
175
-
-
84947617020
-
-
Advertising Internet Gambling. Available from:
-
Humphrey C. Advertising Internet Gambling. Available from:
-
-
-
Humphrey, C.1
-
176
-
-
84863385736
-
-
Arrest of Sportingbet Chairman. Available from: [accessed 25 April]
-
Arrest of Sportingbet Chairman. Available from: [accessed 25 April 2010]
-
(2010)
-
-
-
177
-
-
84863371411
-
-
Problem Gambling Information. Available from: [accessed 25 April]
-
Problem Gambling Information. Available from: [accessed 25 April 2010]
-
(2010)
-
-
-
178
-
-
84863371412
-
-
Interview with Ros Wright: UK's Resolute Fraud-Fighting Advisor. July/August Available from: [accessed 25 April 2010]
-
Carozza D. Interview with Ros Wright: UK's Resolute Fraud-Fighting Advisor. July/August 2007. Available from: [accessed 25 April 2010]
-
(2007)
-
-
Carozza, D.1
-
179
-
-
84863391160
-
-
British Gambling Prevalence Survey Available from:
-
Wardle H, Sproston K, Orford J, Erens B, Griffiths M, Constantine R, Pigott S. British Gambling Prevalence Survey 2007. Available from:
-
(2007)
-
-
Wardle, H.1
Sproston, K.2
Orford, J.3
Erens, B.4
Griffiths, M.5
Constantine, R.6
Pigott, S.7
-
181
-
-
84863385727
-
-
What Is The Legal Definition Of Harassment? Available from: [accessed 25 April]
-
Maughan L. What Is The Legal Definition Of Harassment? Available from: [accessed 25 April 2010]
-
(2010)
-
-
Maughan, L.1
-
182
-
-
84863385730
-
-
The Dutch Approach to Stalking Laws. California Criminal Law October. Available from:
-
Royakkers L. The Dutch Approach to Stalking Laws. California Criminal Law October 2000 Vol.3. Available from:
-
(2000)
, vol.3
-
-
Royakkers, L.1
-
183
-
-
84863391153
-
-
Fighting Cyberstalking. Available from: [accessed 25 April]
-
Press S. Fighting Cyberstalking. Available from: [accessed 25 April 2010]
-
(2010)
-
-
Press, S.1
-
184
-
-
36949024777
-
-
An exploration of predatory behavior in cyberspace: Towards a typology of cyberstalkers. First Monday, September.
-
McFarlane L, Bocij P. An exploration of predatory behavior in cyberspace: Towards a typology of cyberstalkers. First Monday, September 2003; 8(9).
-
(2003)
, vol.8
, Issue.9
-
-
McFarlane, L.1
Bocij, P.2
-
185
-
-
84863366169
-
-
Cyberstalking. Available from: [accessed 25 April]
-
Cyberstalking. Available from: [accessed 25 April 2010]
-
(2010)
-
-
-
186
-
-
84863391152
-
-
Social Networks - The Change of Communication Paradigm Available from:
-
Moravekj D. Social Networks - The Change of Communication Paradigm 2008. Available from:
-
(2008)
-
-
Moravekj, D.1
-
187
-
-
84863366168
-
-
What is cyberterrorism? Even experts can't agree. Harvard Law Record, Available from: [accessed 25 April 2010]
-
Baranetsky V. What is cyberterrorism? Even experts can't agree. Harvard Law Record, 2009. Available from: [accessed 25 April 2010]
-
(2009)
-
-
Baranetsky, V.1
-
188
-
-
84863366171
-
-
Defining cyber terrorism. Available from: [accessed 25 April]
-
Wickramarathna W. Defining cyber terrorism. Available from: [accessed 25 April 2010]
-
(2010)
-
-
Wickramarathna, W.1
-
189
-
-
84863391154
-
-
Cyber Crime And Its Consequences: Introduction to Cyber Crime. Available from: [accessed 25 April]
-
Cyber Crime And Its Consequences: Introduction to Cyber Crime. Available from: [accessed 25 April 2010]
-
(2010)
-
-
-
191
-
-
84863366173
-
-
Cyberterrorism: What's The Worst Case Scenario? Available from: [accessed on 25 April]
-
Cyberterrorism: What's The Worst Case Scenario? Available from: [accessed on 25 April 2010]
-
(2010)
-
-
-
192
-
-
84863371389
-
-
Hackers Launch Massive Attack on Ukrainian President's Web Site. Available from: [accessed on 25 April]
-
Hackers Launch Massive Attack on Ukrainian President's Web Site. Available from: [accessed on 25 April 2010]
-
(2010)
-
-
-
193
-
-
84863366175
-
-
Trade Secret. Available from: [accessed 25 April]
-
Kane S. Trade Secret. Available from: [accessed 25 April 2010]
-
(2010)
-
-
Kane, S.1
-
194
-
-
84863385735
-
-
Trade Secret. Available from: [accessed 25 April]
-
Trade Secret. Available from: [accessed 25 April 2010]
-
(2010)
-
-
-
195
-
-
84863366177
-
-
Trade Secret. Available from: [accessed 25 April]
-
Trade Secret. Available from: [accessed 25 April 2010]
-
(2010)
-
-
-
197
-
-
84863391155
-
-
Viacom Demands Video Removal From YouTube. Available from: [accessed 25 April]
-
Perez JC. Viacom Demands Video Removal From YouTube. Available from: [accessed 25 April 2010]
-
(2010)
-
-
Perez, J.C.1
-
198
-
-
84863371390
-
-
Spam (Monty Python). [accessed 25 April]
-
Spam (Monty Python). [accessed 25 April 2010]
-
(2010)
-
-
-
199
-
-
84863371384
-
-
The phishing guide: understanding and preventing phishing attacks. Technical Info. Available from: [retrieved on 10 July 2006]
-
Ollmann G. The phishing guide: understanding and preventing phishing attacks. Technical Info. 2006. Available from: [retrieved on 10 July 2006]
-
(2006)
-
-
Ollmann, G.1
-
200
-
-
84863371388
-
-
Phishing scam takes aim at MySpace.com. IDG Network. Available from: [retrieved from 2 June 2006]
-
Kirk J. Phishing scam takes aim at MySpace.com. IDG Network. 2006. Available from: [retrieved from 2 June 2006]
-
(2006)
-
-
Kirk, J.1
-
201
-
-
84863366176
-
-
Available from: [retrieved on 20 June]
-
Available from: [retrieved on 20 June 2008]
-
(2008)
-
-
-
202
-
-
84863385742
-
-
Available from: [retrieved on 20 June]
-
Available from: [retrieved on 20 June 2008]
-
(2008)
-
-
-
203
-
-
84863366182
-
-
Available from: [retrieved on 20 June]
-
Available from: [retrieved on 20 June 2008]
-
(2008)
-
-
-
204
-
-
84863385741
-
-
Available from: [retrieved on 20 June]
-
Available from: [retrieved on 20 June 2008]
-
(2008)
-
-
-
205
-
-
84863366181
-
-
Available from: [retrieved on 20 June]
-
Available from: [retrieved on 20 June 2008]
-
(2008)
-
-
-
206
-
-
84863366180
-
-
Available from: [retrieved on 20 June]
-
Available from: [retrieved on 20 June 2008]
-
(2008)
-
-
-
207
-
-
84863371394
-
-
Available from: [retrieved on 20 June]
-
Available from: [retrieved on 20 June 2008]
-
(2008)
-
-
|