메뉴 건너뛰기




Volumn 5, Issue 4, 2012, Pages 422-437

A survey of cyber crimes

Author keywords

Forensics; IDS; MAC security

Indexed keywords

CRIME; NETWORK LAYERS; SURVEYS;

EID: 84863386481     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.331     Document Type: Review
Times cited : (54)

References (208)
  • 1
    • 84863385709 scopus 로고    scopus 로고
    • Cybercrime: Investigating High-Technology Computer Crime
    • Anderson Publishing: Cleveland, Mississippi
    • Moore R. Cybercrime: Investigating High-Technology Computer Crime. Anderson Publishing: Cleveland, Mississippi, 2005.
    • (2005)
    • Moore, R.1
  • 2
    • 84863363206 scopus 로고    scopus 로고
    • Cyber Crime Overview. Available from: [accessed on 25 April 2010]
    • Cyber Crime Overview. 2008. Available from: [accessed on 25 April 2010]
    • (2008)
  • 3
    • 84863366144 scopus 로고    scopus 로고
    • Cyber Forensics. Available from: [accessed on 25 April 2010]
    • Cyber Forensics. 2008. Available from: [accessed on 25 April 2010]
    • (2008)
  • 4
    • 84863344988 scopus 로고    scopus 로고
    • Cyber Crimes. April Available from: [accessed on 25 April 2010]
    • Cyber Crimes. April 2008. Available from: [accessed on 25 April 2010]
    • (2008)
  • 6
    • 72449209394 scopus 로고    scopus 로고
    • Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
    • Englund H, Johansson T. Three ways to mount distinguishing attacks on irregularly clocked stream ciphers. International Journal of Security and Networks 2006; 1(1/2): 95-102.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.1-2 , pp. 95-102
    • Englund, H.1    Johansson, T.2
  • 10
    • 84890880165 scopus 로고    scopus 로고
    • Limiting DoS attacks during multihop data delivery in wireless sensor networks
    • Deng J, Han R, Mishra S. Limiting DoS attacks during multihop data delivery in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4): 167-178.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 167-178
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 11
    • 74549166520 scopus 로고    scopus 로고
    • Wireless networking security: open issues in trust, management, interoperation and measurement
    • Evans JB, Wang W, Ewy BJ. Wireless networking security: open issues in trust, management, interoperation and measurement. International Journal of Security and Networks 2006; 1(1/2): 84-94.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.1-2 , pp. 84-94
    • Evans, J.B.1    Wang, W.2    Ewy, B.J.3
  • 14
    • 70349968010 scopus 로고    scopus 로고
    • Attacks and countermeasures in multi-hop cognitive radio networks
    • Hu F, Dong D, Xiao Y. Attacks and countermeasures in multi-hop cognitive radio networks. International Journal of Security and Networks 2009; 4(4): 263-271.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 263-271
    • Hu, F.1    Dong, D.2    Xiao, Y.3
  • 15
    • 68149180871 scopus 로고    scopus 로고
    • Intrusion detection system for denial-of-service flooding attacks in SIP communication networks
    • Ehlert S, Rebahi Y, Magedanz T. Intrusion detection system for denial-of-service flooding attacks in SIP communication networks. International Journal of Security and Networks 2009; 4(3): 189-200.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.3 , pp. 189-200
    • Ehlert, S.1    Rebahi, Y.2    Magedanz, T.3
  • 16
    • 77949692385 scopus 로고    scopus 로고
    • Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees
    • Dalton II GC, Edge KS, Mills RF, Raines RA. Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees. International Journal of Security and Networks 2010; 5(2/3): 87-95.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 87-95
    • Dalton II, G.C.1    Edge, K.S.2    Mills, R.F.3    Raines, R.A.4
  • 17
    • 79951648076 scopus 로고    scopus 로고
    • LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
    • Hsu H, Zhu S, Hurson AR. LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network. International Journal of Security and Networks 2007; 2(3/4): 202-215.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 202-215
    • Hsu, H.1    Zhu, S.2    Hurson, A.R.3
  • 19
    • 61849085156 scopus 로고    scopus 로고
    • An evaluation of connection characteristics for separating network attacks
    • Berthier R, Cukier M. An evaluation of connection characteristics for separating network attacks. International Journal of Security and Networks 2009; 4(1/2): 110-124.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 110-124
    • Berthier, R.1    Cukier, M.2
  • 22
    • 49949107235 scopus 로고    scopus 로고
    • Load-balanced key establishment methodologies in wireless sensor networks
    • Araz O, Qi H. Load-balanced key establishment methodologies in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4): 158-166.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 158-166
    • Araz, O.1    Qi, H.2
  • 23
    • 79951716783 scopus 로고    scopus 로고
    • Low-power authenticated group key agreement for heterogeneous wireless networks
    • Teo J, Tan C, Ng J. Low-power authenticated group key agreement for heterogeneous wireless networks. International Journal of Security and Networks 2006; 1(3/4): 226-236.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 226-236
    • Teo, J.1    Tan, C.2    Ng, J.3
  • 24
    • 79551646922 scopus 로고    scopus 로고
    • End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
    • Ling H, Znati T. End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks. International Journal of Security and Networks 2007; 2(1/2): 109-121.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 109-121
    • Ling, H.1    Znati, T.2
  • 25
    • 68149086398 scopus 로고    scopus 로고
    • Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
    • Hoeper K, Gong G. Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4): 239-250.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 239-250
    • Hoeper, K.1    Gong, G.2
  • 26
    • 38049042723 scopus 로고    scopus 로고
    • On security proof of McCullagh-Barreto's key agreement protocol and its variants
    • Cheng Z, Chen L. On security proof of McCullagh-Barreto's key agreement protocol and its variants. International Journal of Security and Networks 2007; 2(3/4): 251-259.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 251-259
    • Cheng, Z.1    Chen, L.2
  • 28
    • 79951619296 scopus 로고    scopus 로고
    • A novel conference key management solution for secure dynamic conferencing
    • Zou X, Karandikar Y. A novel conference key management solution for secure dynamic conferencing. International Journal of Security and Networks 2008; 3(1): 47-53.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 47-53
    • Zou, X.1    Karandikar, Y.2
  • 30
    • 79951661564 scopus 로고    scopus 로고
    • Secure user-identification and key distribution scheme preserving anonymity
    • Tripathy S, Nandi S. Secure user-identification and key distribution scheme preserving anonymity. International Journal of Security and Networks 2008; 3(3): 201-205.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 201-205
    • Tripathy, S.1    Nandi, S.2
  • 31
    • 79551645150 scopus 로고    scopus 로고
    • A one-way function based framework for pairwise key establishment in sensor networks
    • Ma L, Teymorian AY, Xing K, Du D. A one-way function based framework for pairwise key establishment in sensor networks. International Journal of Security and Networks 2008; 3(4): 217-225.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.4 , pp. 217-225
    • Ma, L.1    Teymorian, A.Y.2    Xing, K.3    Du, D.4
  • 33
    • 61849158146 scopus 로고    scopus 로고
    • An efficient group key management scheme for mobile ad hoc networks
    • Wu B, Wu J, Dong Y. An efficient group key management scheme for mobile ad hoc networks. International Journal of Security and Networks 2009; 4(1/2): 125-134.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 125-134
    • Wu, B.1    Wu, J.2    Dong, Y.3
  • 36
    • 77949732329 scopus 로고    scopus 로고
    • Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
    • Guo H, Mu Y, Zhang XY, Li ZJ. Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security. International Journal of Security and Networks 2010; 5(2/3): 173-187.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 173-187
    • Guo, H.1    Mu, Y.2    Zhang, X.Y.3    Li, Z.J.4
  • 44
    • 77955716028 scopus 로고    scopus 로고
    • The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
    • Wang X. The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. International Journal of Security and Networks 2006; 1(3/4): 184-197.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 184-197
    • Wang, X.1
  • 46
    • 67649498303 scopus 로고    scopus 로고
    • Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
    • Liu Y, Comaniciu C, Man H. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection. International Journal of Security and Networks 2006; 1(3/4): 243-254.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 243-254
    • Liu, Y.1    Comaniciu, C.2    Man, H.3
  • 47
    • 85086420396 scopus 로고    scopus 로고
    • Syntax vs. semantics: competing approaches to dynamic network intrusion detection
    • Scheirer W, Chuah M. Syntax vs. semantics: competing approaches to dynamic network intrusion detection. International Journal of Security and Networks 2008; 3(1): 24-35.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 24-35
    • Scheirer, W.1    Chuah, M.2
  • 48
    • 72549101766 scopus 로고    scopus 로고
    • An agent-based framework for intrusion detection alert verification and event correlation
    • Uphoff B, Wong JS. An agent-based framework for intrusion detection alert verification and event correlation. International Journal of Security and Networks 2008; 3(3): 193-200.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 193-200
    • Uphoff, B.1    Wong, J.S.2
  • 51
    • 77949801623 scopus 로고    scopus 로고
    • Authentication and secret search mechanisms for RFID-aware wireless sensor networks
    • Huang S, Shieh S. Authentication and secret search mechanisms for RFID-aware wireless sensor networks. International Journal of Security and Networks 2010; 5(1): 15-25.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 15-25
    • Huang, S.1    Shieh, S.2
  • 52
    • 77949864345 scopus 로고    scopus 로고
    • Lightweight authentication protocol for mobile RFID networks
    • Yang M. Lightweight authentication protocol for mobile RFID networks. International Journal of Security and Networks 2010; 5(1): 53-62.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 53-62
    • Yang, M.1
  • 57
    • 77949750049 scopus 로고    scopus 로고
    • A ubiquitous mobile telemedicine system for the elderly using RFID
    • Raad M. A ubiquitous mobile telemedicine system for the elderly using RFID. International Journal of Security and Networks 2010; 5(2/3): 156-164.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 156-164
    • Raad, M.1
  • 58
  • 59
    • 79951694028 scopus 로고    scopus 로고
    • Analysis of routing security-energy trade-offs in wireless sensor networks
    • Al-Karaki JN. Analysis of routing security-energy trade-offs in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4): 147-157.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 147-157
    • Al-Karaki, J.N.1
  • 62
    • 77954327354 scopus 로고    scopus 로고
    • PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks
    • Li F, Srinivasan A, Wu J. PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks. International Journal of Security and Networks 2008; 3(3): 173-182.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 173-182
    • Li, F.1    Srinivasan, A.2    Wu, J.3
  • 63
    • 77949844099 scopus 로고    scopus 로고
    • An efficient secure data dissemination scheme for grid structure wireless sensor networks
    • Hsiao Y, Hwang R. An efficient secure data dissemination scheme for grid structure wireless sensor networks. International Journal of Security and Networks 2010; 5(1): 26-34.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 26-34
    • Hsiao, Y.1    Hwang, R.2
  • 64
    • 77949830969 scopus 로고    scopus 로고
    • A cross-layer authentication design for secure video transportation in wireless sensor network
    • Wang J, Smith GL. A cross-layer authentication design for secure video transportation in wireless sensor network. International Journal of Security and Networks 2010; 5(1): 63-76.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 63-76
    • Wang, J.1    Smith, G.L.2
  • 66
    • 79951662876 scopus 로고    scopus 로고
    • Towards a realistic testbed for wireless network reliability and security performance studies
    • Hu F, Rughoonundon A, Celentano L. Towards a realistic testbed for wireless network reliability and security performance studies. International Journal of Security and Networks 2008; 3(1): 63-77.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 63-77
    • Hu, F.1    Rughoonundon, A.2    Celentano, L.3
  • 67
  • 68
    • 79551651366 scopus 로고    scopus 로고
    • Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks
    • Kandikattu R, Jacob L. Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks. International Journal of Security and Networks 2008; 3(4): 258-274.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.4 , pp. 258-274
    • Kandikattu, R.1    Jacob, L.2
  • 69
    • 61849158147 scopus 로고    scopus 로고
    • Designing user studies for security applications: a case study with wireless network configuration
    • Kuo C, AC Perrig, Walker J. Designing user studies for security applications: a case study with wireless network configuration. International Journal of Security and Networks 2009; 4(1/2): 101-109.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 101-109
    • Kuo, C.1    Perrig, A.C.2    Walker, J.3
  • 71
    • 77949835881 scopus 로고    scopus 로고
    • Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
    • Xu L, Chen S, Huang X, Mu Y. Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks. International Journal of Security and Networks 2010; 5(1): 35-44.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 35-44
    • Xu, L.1    Chen, S.2    Huang, X.3    Mu, Y.4
  • 72
    • 74549116861 scopus 로고    scopus 로고
    • Securing Wi-Fi networks with position verification: extended version
    • Malaney RA. Securing Wi-Fi networks with position verification: extended version. International Journal of Security and Networks 2007; 2(1/2): 27-36.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 27-36
    • Malaney, R.A.1
  • 77
    • 85016433011 scopus 로고    scopus 로고
    • Efficient multicast stream authentication for the fully adversarial network model
    • Tartary C, Wang H. Efficient multicast stream authentication for the fully adversarial network model. International Journal of Security and Networks 2007; 2(3/4): 175-191.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 175-191
    • Tartary, C.1    Wang, H.2
  • 85
    • 68149158275 scopus 로고    scopus 로고
    • An efficient one-time password authentication scheme using a smart card
    • Lee S, Sivalingam KM. An efficient one-time password authentication scheme using a smart card. International Journal of Security and Networks 2009; 4(3): 145-152.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.3 , pp. 145-152
    • Lee, S.1    Sivalingam, K.M.2
  • 87
    • 77949817850 scopus 로고    scopus 로고
    • Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
    • Tsai K, Hsu C, Wu T. Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks. International Journal of Security and Networks 2010; 5(1): 45-52.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 45-52
    • Tsai, K.1    Hsu, C.2    Wu, T.3
  • 90
    • 54249117650 scopus 로고    scopus 로고
    • Secure scalable group signature with dynamic joins and separable authorities
    • Kiayias A, Yung M. Secure scalable group signature with dynamic joins and separable authorities. International Journal of Security and Networks 2006; 1(1/2): 24-45.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.1-2 , pp. 24-45
    • Kiayias, A.1    Yung, M.2
  • 94
    • 77954644745 scopus 로고    scopus 로고
    • A new signature scheme without random oracles
    • Tan C. A new signature scheme without random oracles. International Journal of Security and Networks 2006; 1(3/4): 237-242.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 237-242
    • Tan, C.1
  • 95
    • 79551652560 scopus 로고    scopus 로고
    • DKMS: distributed hierarchical access control for multimedia networks
    • Li R, Li J, Chen H. DKMS: distributed hierarchical access control for multimedia networks. International Journal of Security and Networks 2007; 2(1/2): 3-10.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 3-10
    • Li, R.1    Li, J.2    Chen, H.3
  • 96
    • 74049111426 scopus 로고    scopus 로고
    • Hash-AV: fast virus signature scanning by cache-resident filters
    • Erdogan O, Cao P. Hash-AV: fast virus signature scanning by cache-resident filters. International Journal of Security and Networks 2007; 2(1/2): 50-59.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 50-59
    • Erdogan, O.1    Cao, P.2
  • 97
    • 79551643767 scopus 로고    scopus 로고
    • Secure message delivery in publish/subscribe networks using overlay multicast
    • Rabinovich P, Simon R. Secure message delivery in publish/subscribe networks using overlay multicast. International Journal of Security and Networks 2007; 2(1/2): 60-70.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 60-70
    • Rabinovich, P.1    Simon, R.2
  • 98
    • 34548366188 scopus 로고    scopus 로고
    • Optimal worm-scanning method using vulnerable-host distributions
    • Chen Z, Ji C. Optimal worm-scanning method using vulnerable-host distributions. International Journal of Security and Networks 2007; 2(1/2): 71-80.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 71-80
    • Chen, Z.1    Ji, C.2
  • 99
    • 39349109602 scopus 로고    scopus 로고
    • Design and analysis of a multipacket signature detection system
    • Artan NS, Chao HJ. Design and analysis of a multipacket signature detection system. International Journal of Security and Networks 2007; 2(1/2): 122-136.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 122-136
    • Artan, N.S.1    Chao, H.J.2
  • 103
    • 66249092571 scopus 로고    scopus 로고
    • Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
    • Huang D. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4): 272-283.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 272-283
    • Huang, D.1
  • 104
    • 77955714466 scopus 로고    scopus 로고
    • Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
    • Ray I, Poolsappasit N. Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. International Journal of Security and Networks 2008; 3(2): 80-94.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.2 , pp. 80-94
    • Ray, I.1    Poolsappasit, N.2
  • 111
    • 77952481544 scopus 로고    scopus 로고
    • ID-based threshold proxy signcryption scheme from bilinear pairings
    • Li F, Xin X, Hu Y. ID-based threshold proxy signcryption scheme from bilinear pairings. International Journal of Security and Networks 2008; 3(3): 206-215.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 206-215
    • Li, F.1    Xin, X.2    Hu, Y.3
  • 121
    • 70349969846 scopus 로고    scopus 로고
    • A proactive secret sharing scheme in matrix projection method
    • Bai L, Zou X. A proactive secret sharing scheme in matrix projection method. International Journal of Security and Networks 2009; 4(4): 201-209.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 201-209
    • Bai, L.1    Zou, X.2
  • 122
  • 123
    • 70349949111 scopus 로고    scopus 로고
    • Visibility: a novel concept for characterising provable network digital evidences
    • Rekhis S, Boudriga NA. Visibility: a novel concept for characterising provable network digital evidences. International Journal of Security and Networks 2009; 4(4): 234-245.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 234-245
    • Rekhis, S.1    Boudriga, N.A.2
  • 126
    • 77949837905 scopus 로고    scopus 로고
    • A backpressure technique for filtering spoofed traffic at upstream routers
    • Malliga S, Tamilarasi A. A backpressure technique for filtering spoofed traffic at upstream routers. International Journal of Security and Networks 2010; 5(1): 3-14.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 3-14
    • Malliga, S.1    Tamilarasi, A.2
  • 128
    • 77949694146 scopus 로고    scopus 로고
    • Security and privacy on low-cost radio frequency identification systems
    • Sun L. Security and privacy on low-cost radio frequency identification systems. International Journal of Security and Networks 2010; 5(2/3): 128-134.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 128-134
    • Sun, L.1
  • 129
    • 77949765113 scopus 로고    scopus 로고
    • Radio frequency identification: a case study of healthcare organisations
    • Azevedo SG, Ferreira JJ. Radio frequency identification: a case study of healthcare organisations. International Journal of Security and Networks 2010; 5(2/3): 147-155.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 147-155
    • Azevedo, S.G.1    Ferreira, J.J.2
  • 130
    • 77949666177 scopus 로고    scopus 로고
    • Perceived barriers to the widespread commercial use of radio frequency identification technology
    • Rodrigues MJ, James K. Perceived barriers to the widespread commercial use of radio frequency identification technology. International Journal of Security and Networks 2010; 5(2/3): 165-172.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 165-172
    • Rodrigues, M.J.1    James, K.2
  • 132
    • 4344633220 scopus 로고    scopus 로고
    • Routledge Cavendish: London, ISBN 1859417760. [retrieved on 20 June 2008]
    • Bantekas I, Nash S. International Criminal Law 2/E, Routledge Cavendish: London, 2003. ISBN 1859417760. [retrieved on 20 June 2008]
    • (2003) International Criminal Law 2/E
    • Bantekas, I.1    Nash, S.2
  • 133
    • 84863366149 scopus 로고    scopus 로고
    • Copyright. Available from: [accessed on 25 April]
    • Copyright. Available from: [accessed on 25 April 2010]
    • (2010)
  • 134
    • 84863363217 scopus 로고    scopus 로고
    • Copyright infringement. Available from: [accessed on 25 April]
    • Copyright infringement. Available from: [accessed on 25 April 2010]
    • (2010)
  • 135
    • 84863363216 scopus 로고    scopus 로고
    • SCO-Linux controversies. Available from: [accessed on 25 April]
    • SCO-Linux controversies. Available from: [accessed on 25 April 2010]
    • (2010)
  • 136
    • 84863371374 scopus 로고    scopus 로고
    • Spam (electronic). Available from: [accessed on 25 April]
    • Spam (electronic). Available from: [accessed on 25 April 2010]
    • (2010)
  • 137
    • 84863391134 scopus 로고    scopus 로고
    • Crist Announces First Case Under Florida Anti-Spam Law. Available from: [accessed on 25 April]
    • Crist Announces First Case Under Florida Anti-Spam Law. Available from: [accessed on 25 April 2010]
    • (2010)
  • 138
    • 84863385718 scopus 로고    scopus 로고
    • Crist: Judgment Ends Duo's Illegal Spam, Internet Operations. Available from: [accessed on 25 April]
    • Crist: Judgment Ends Duo's Illegal Spam, Internet Operations. Available from: [accessed on 25 April 2010]
    • (2010)
  • 139
    • 84863363219 scopus 로고    scopus 로고
    • Businessman wins e-mail spam case. Available from: [accessed on 25 April]
    • Businessman wins e-mail spam case. Available from: [accessed on 25 April 2010]
    • (2010)
  • 140
    • 84947616106 scopus 로고    scopus 로고
    • Scotsman wins £1,300 settlement against spammer. March Available from: [retrieved on 25 April 2010]
    • Leyden J. Scotsman wins £1, 300 settlement against spammer. March 2007. Available from: [retrieved on 25 April 2010]
    • (2007)
    • Leyden, J.1
  • 141
    • 84863391135 scopus 로고    scopus 로고
    • One of world's top 10 spammers held in Seattle. Available from: [accessed on 25 April]
    • One of world's top 10 spammers held in Seattle. Available from: [accessed on 25 April 2010]
    • (2010)
  • 143
    • 84863363218 scopus 로고    scopus 로고
    • Cyber Security Tip ST04-015. United States Computer Emergency Readiness Team. Available from: [retrieved on 2 May 2008]
    • McDowell M. Cyber Security Tip ST04-015. United States Computer Emergency Readiness Team. 2008. Available from: [retrieved on 2 May 2008]
    • (2008)
    • McDowell, M.1
  • 144
    • 84863385716 scopus 로고    scopus 로고
    • January 2001 thread on the UNISOG mailing list. Available from: [retrieved on 20 June]
    • January 2001 thread on the UNISOG mailing list. Available from: [retrieved on 20 June 2008]
    • (2008)
  • 145
    • 84863366151 scopus 로고    scopus 로고
    • Massive DDoS Attack Hit DNS Root Servers. October Available from: [accessed on 25 April 2010]
    • Naraine R. Massive DDoS Attack Hit DNS Root Servers. October 2002. Available from: [accessed on 25 April 2010]
    • (2002)
    • Naraine, R.1
  • 147
    • 84863366153 scopus 로고    scopus 로고
    • The Internets Are Going to War. January Available from: [accessed on 25 April 2010]
    • Landers C, The Internets Are Going to War. January 2008. Available from: [accessed on 25 April 2010]
    • (2008)
    • Landers, C.1
  • 148
    • 84863366150 scopus 로고    scopus 로고
    • Available from: [retrieved on 20 June]
    • Available from: [retrieved on 20 June 2008]
    • (2008)
  • 149
    • 84863366154 scopus 로고    scopus 로고
    • Penalty for Computer Contamination. Joint Commission on Technology and Science. Available from: [retrieved on 17 September]
    • Penalty for Computer Contamination. Joint Commission on Technology and Science. Available from: [retrieved on 17 September 2010]
    • (2010)
  • 151
    • 84863371378 scopus 로고
    • Beware: Hackers at play. Newsweek, 5 September -, retrieved on 20 June 2008]
    • Beware: Hackers at play. Newsweek, 5 September 1983: 42-46, 48 [retrieved on 20 June 2008]
    • (1983) , vol.48 , pp. 42-46
  • 152
    • 0021201312 scopus 로고
    • Attacks on computers: congressional hearings and pending legislation
    • Oakland, CA, USA, 29 April-2 May 1984. IEEE Press: New York
    • Bailey D. Attacks on computers: congressional hearings and pending legislation. In IEEE Symposium on Security and Privacy, Oakland, CA, USA, 29 April-2 May 1984. IEEE Press: New York, 1984; 180-187.
    • (1984) IEEE Symposium on Security and Privacy , pp. 180-187
    • Bailey, D.1
  • 153
    • 84863385722 scopus 로고    scopus 로고
    • Recognized hackers. April Available from: [accessed on 25 April 2008]
    • Recognized hackers. April 2007. Available from: [accessed on 25 April 2008]
    • (2007)
  • 154
    • 84863391139 scopus 로고    scopus 로고
    • The Robert Morris Internet Worm. Available from: Retrieved August 23, 2008. [accessed on 25 April 2010]
    • Kehoe B.P. The Robert Morris Internet Worm. 2007. Available from: Retrieved August 23, 2008. [accessed on 25 April 2010]
    • (2007)
    • Kehoe, B.P.1
  • 155
    • 84863371380 scopus 로고    scopus 로고
    • Available from: [accessed on 25 April]
    • Jason Burks Available from: [accessed on 25 April 2010]
    • (2010)
    • Burks, J.1
  • 156
    • 84863366158 scopus 로고    scopus 로고
    • Convicted Computer Hackers. Available from: [accessed on 25 April]
    • Convicted Computer Hackers. Available from: [accessed on 25 April 2010]
    • (2010)
  • 157
  • 158
    • 84863385721 scopus 로고    scopus 로고
    • The Origins of Phreaking. Blacklisted! 411. April Available from: Retrieved 2008-06-21. [accessed on 25 April 2010]
    • Robson G.D. The Origins of Phreaking. Blacklisted! 411. April 2004. Available from: Retrieved 2008-06-21. [accessed on 25 April 2010]
    • (2004)
    • Robson, G.D.1
  • 159
    • 55849103022 scopus 로고
    • Pushbutton Calling with a Two-Group Voice-Frequency Code
    • Available from:
    • Schenker L. Pushbutton Calling with a Two-Group Voice-Frequency Code, The Bell system technical journal 1960; 39(1): 235-255. Available from:
    • (1960) The Bell system technical journal. , vol.39 , Issue.1 , pp. 235-255
    • Schenker, L.1
  • 160
    • 84863391145 scopus 로고    scopus 로고
    • Phreaking. Available from: [accessed on 25 April]
    • Phreaking. Available from: [accessed on 25 April 2010]
    • (2010)
  • 161
    • 34848911641 scopus 로고    scopus 로고
    • Social Phishing. Communications of the ACM. October Available from: [Retrieved on 3 June 2006]
    • Jagatic T, Johnson N, Jakobsson M, and Menczer F. Social Phishing. Communications of the ACM. October 2007. Available from: [Retrieved on 3 June 2006]
    • (2007)
    • Jagatic, T.1    Johnson, N.2    Jakobsson, M.3    Menczer, F.4
  • 162
    • 84863366162 scopus 로고    scopus 로고
    • Phishing and Spamming via IM (SPIM). Internet Storm Center.
    • Available from: [retrieved on 5 December 2006]
    • Koon T. Phishing and Spamming via IM (SPIM). Internet Storm Center. 2006. Available from: [retrieved on 5 December 2006]
    • (2006)
    • Koon, T.1
  • 163
    • 84947615672 scopus 로고
    • System security: a hacker's perspective
    • Felix J, Hauck C. System security: a hacker's perspective. Interex Proceedings, 1987; 1: 6.
    • (1987) Interex Proceedings , vol.1 , pp. 6
    • Felix, J.1    Hauck, C.2
  • 164
    • 84863391147 scopus 로고    scopus 로고
    • Identity theft. Available from: [retrieved on 25 April]
    • Identity theft. Available from: [retrieved on 25 April 2010]
    • (2010)
  • 165
    • 84863366164 scopus 로고    scopus 로고
    • Identity Theft. McAfee White Paper January Available from:
    • Paget F. Identity Theft. McAfee White Paper January 2007. Available from:
    • (2007)
    • Paget, F.1
  • 166
    • 84863371381 scopus 로고    scopus 로고
    • Trojans fuel ID theft boom. January Available from: [accessed 25 April 2010]
    • Leyden J. Trojans fuel ID theft boom. January 2007. Available from: [accessed 25 April 2010]
    • (2007)
    • Leyden, J.1
  • 167
    • 84863391146 scopus 로고    scopus 로고
    • Identity Theft. Available from: [accessed 25 April]
    • Paget F. Identity Theft. Available from: [accessed 25 April 2010]
    • (2010)
    • Paget, F.1
  • 168
    • 84863371383 scopus 로고    scopus 로고
    • 325 000 names on terror list. Available from: [accessed 25 April]
    • 325 000 names on terror list. Available from: [accessed 25 April 2010]
    • (2010)
  • 169
    • 0028458027 scopus 로고
    • Current Information on the Scope and Nature of Child Sexual Abuse
    • Sum-Fall.
    • Finkelhor D. Current Information on the Scope and Nature of Child Sexual Abuse. Future of Children (Sum-Fall 1994); 4(2): 31-53.
    • (1994) Future of Children , vol.4 , Issue.2 , pp. 31-53
    • Finkelhor, D.1
  • 170
    • 84863371397 scopus 로고    scopus 로고
    • Child porn is being 'normalised' by panic merchants
    • January 12
    • Hume M. Child porn is being 'normalised' by panic merchants. The Times. January 12, 2004.
    • (2004) The Times
    • Hume, M.1
  • 172
    • 40049108338 scopus 로고    scopus 로고
    • Online "predators" and their victims: Myths, realities, and implications for prevention and treatment
    • Wolak J, Finkelhor D, Mitchell K, Ybarra ML. Online "predators" and their victims: Myths, realities, and implications for prevention and treatment. American Psychologist 2008; 63(2): 111-128.
    • (2008) American Psychologist , vol.63 , Issue.2 , pp. 111-128
    • Wolak, J.1    Finkelhor, D.2    Mitchell, K.3    Ybarra, M.L.4
  • 173
    • 84863385744 scopus 로고    scopus 로고
    • Online gambling. Available from: Online-gambling#cite-note-9 [accessed 25 April]
    • Online gambling. Available from: Online-gambling#cite-note-9 [accessed 25 April 2010]
    • (2010)
  • 174
    • 84863366178 scopus 로고    scopus 로고
    • Legality of online gambling. Available from: [accessed 25 April]
    • Legality of online gambling. Available from: [accessed 25 April 2010]
    • (2010)
  • 175
    • 84947617020 scopus 로고    scopus 로고
    • Advertising Internet Gambling. Available from:
    • Humphrey C. Advertising Internet Gambling. Available from:
    • Humphrey, C.1
  • 176
    • 84863385736 scopus 로고    scopus 로고
    • Arrest of Sportingbet Chairman. Available from: [accessed 25 April]
    • Arrest of Sportingbet Chairman. Available from: [accessed 25 April 2010]
    • (2010)
  • 177
    • 84863371411 scopus 로고    scopus 로고
    • Problem Gambling Information. Available from: [accessed 25 April]
    • Problem Gambling Information. Available from: [accessed 25 April 2010]
    • (2010)
  • 178
    • 84863371412 scopus 로고    scopus 로고
    • Interview with Ros Wright: UK's Resolute Fraud-Fighting Advisor. July/August Available from: [accessed 25 April 2010]
    • Carozza D. Interview with Ros Wright: UK's Resolute Fraud-Fighting Advisor. July/August 2007. Available from: [accessed 25 April 2010]
    • (2007)
    • Carozza, D.1
  • 181
    • 84863385727 scopus 로고    scopus 로고
    • What Is The Legal Definition Of Harassment? Available from: [accessed 25 April]
    • Maughan L. What Is The Legal Definition Of Harassment? Available from: [accessed 25 April 2010]
    • (2010)
    • Maughan, L.1
  • 182
    • 84863385730 scopus 로고    scopus 로고
    • The Dutch Approach to Stalking Laws. California Criminal Law October. Available from:
    • Royakkers L. The Dutch Approach to Stalking Laws. California Criminal Law October 2000 Vol.3. Available from:
    • (2000) , vol.3
    • Royakkers, L.1
  • 183
    • 84863391153 scopus 로고    scopus 로고
    • Fighting Cyberstalking. Available from: [accessed 25 April]
    • Press S. Fighting Cyberstalking. Available from: [accessed 25 April 2010]
    • (2010)
    • Press, S.1
  • 184
    • 36949024777 scopus 로고    scopus 로고
    • An exploration of predatory behavior in cyberspace: Towards a typology of cyberstalkers. First Monday, September.
    • McFarlane L, Bocij P. An exploration of predatory behavior in cyberspace: Towards a typology of cyberstalkers. First Monday, September 2003; 8(9).
    • (2003) , vol.8 , Issue.9
    • McFarlane, L.1    Bocij, P.2
  • 185
    • 84863366169 scopus 로고    scopus 로고
    • Cyberstalking. Available from: [accessed 25 April]
    • Cyberstalking. Available from: [accessed 25 April 2010]
    • (2010)
  • 186
    • 84863391152 scopus 로고    scopus 로고
    • Social Networks - The Change of Communication Paradigm Available from:
    • Moravekj D. Social Networks - The Change of Communication Paradigm 2008. Available from:
    • (2008)
    • Moravekj, D.1
  • 187
    • 84863366168 scopus 로고    scopus 로고
    • What is cyberterrorism? Even experts can't agree. Harvard Law Record, Available from: [accessed 25 April 2010]
    • Baranetsky V. What is cyberterrorism? Even experts can't agree. Harvard Law Record, 2009. Available from: [accessed 25 April 2010]
    • (2009)
    • Baranetsky, V.1
  • 188
    • 84863366171 scopus 로고    scopus 로고
    • Defining cyber terrorism. Available from: [accessed 25 April]
    • Wickramarathna W. Defining cyber terrorism. Available from: [accessed 25 April 2010]
    • (2010)
    • Wickramarathna, W.1
  • 189
    • 84863391154 scopus 로고    scopus 로고
    • Cyber Crime And Its Consequences: Introduction to Cyber Crime. Available from: [accessed 25 April]
    • Cyber Crime And Its Consequences: Introduction to Cyber Crime. Available from: [accessed 25 April 2010]
    • (2010)
  • 190
  • 191
    • 84863366173 scopus 로고    scopus 로고
    • Cyberterrorism: What's The Worst Case Scenario? Available from: [accessed on 25 April]
    • Cyberterrorism: What's The Worst Case Scenario? Available from: [accessed on 25 April 2010]
    • (2010)
  • 192
    • 84863371389 scopus 로고    scopus 로고
    • Hackers Launch Massive Attack on Ukrainian President's Web Site. Available from: [accessed on 25 April]
    • Hackers Launch Massive Attack on Ukrainian President's Web Site. Available from: [accessed on 25 April 2010]
    • (2010)
  • 193
    • 84863366175 scopus 로고    scopus 로고
    • Trade Secret. Available from: [accessed 25 April]
    • Kane S. Trade Secret. Available from: [accessed 25 April 2010]
    • (2010)
    • Kane, S.1
  • 194
    • 84863385735 scopus 로고    scopus 로고
    • Trade Secret. Available from: [accessed 25 April]
    • Trade Secret. Available from: [accessed 25 April 2010]
    • (2010)
  • 195
    • 84863366177 scopus 로고    scopus 로고
    • Trade Secret. Available from: [accessed 25 April]
    • Trade Secret. Available from: [accessed 25 April 2010]
    • (2010)
  • 197
    • 84863391155 scopus 로고    scopus 로고
    • Viacom Demands Video Removal From YouTube. Available from: [accessed 25 April]
    • Perez JC. Viacom Demands Video Removal From YouTube. Available from: [accessed 25 April 2010]
    • (2010)
    • Perez, J.C.1
  • 198
    • 84863371390 scopus 로고    scopus 로고
    • Spam (Monty Python). [accessed 25 April]
    • Spam (Monty Python). [accessed 25 April 2010]
    • (2010)
  • 199
    • 84863371384 scopus 로고    scopus 로고
    • The phishing guide: understanding and preventing phishing attacks. Technical Info. Available from: [retrieved on 10 July 2006]
    • Ollmann G. The phishing guide: understanding and preventing phishing attacks. Technical Info. 2006. Available from: [retrieved on 10 July 2006]
    • (2006)
    • Ollmann, G.1
  • 200
    • 84863371388 scopus 로고    scopus 로고
    • Phishing scam takes aim at MySpace.com. IDG Network. Available from: [retrieved from 2 June 2006]
    • Kirk J. Phishing scam takes aim at MySpace.com. IDG Network. 2006. Available from: [retrieved from 2 June 2006]
    • (2006)
    • Kirk, J.1
  • 201
    • 84863366176 scopus 로고    scopus 로고
    • Available from: [retrieved on 20 June]
    • Available from: [retrieved on 20 June 2008]
    • (2008)
  • 202
    • 84863385742 scopus 로고    scopus 로고
    • Available from: [retrieved on 20 June]
    • Available from: [retrieved on 20 June 2008]
    • (2008)
  • 203
    • 84863366182 scopus 로고    scopus 로고
    • Available from: [retrieved on 20 June]
    • Available from: [retrieved on 20 June 2008]
    • (2008)
  • 204
    • 84863385741 scopus 로고    scopus 로고
    • Available from: [retrieved on 20 June]
    • Available from: [retrieved on 20 June 2008]
    • (2008)
  • 205
    • 84863366181 scopus 로고    scopus 로고
    • Available from: [retrieved on 20 June]
    • Available from: [retrieved on 20 June 2008]
    • (2008)
  • 206
    • 84863366180 scopus 로고    scopus 로고
    • Available from: [retrieved on 20 June]
    • Available from: [retrieved on 20 June 2008]
    • (2008)
  • 207
    • 84863371394 scopus 로고    scopus 로고
    • Available from: [retrieved on 20 June]
    • Available from: [retrieved on 20 June 2008]
    • (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.