메뉴 건너뛰기




Volumn 6, Issue 1, 2012, Pages 891-903

Examining the social networks of malware writers and hackers

Author keywords

Computer hackers; Cyber crime; Geography of networks; Malicious software; Malware; Network analysis

Indexed keywords


EID: 84867688873     PISSN: None     EISSN: 09742891     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (111)

References (26)
  • 1
    • 84867082037 scopus 로고    scopus 로고
    • The Risk Propensity and Rationality of Computer Hackers
    • Bachmann, M. (2010). The Risk Propensity and Rationality of Computer Hackers. International Journal of Cyber Criminology, 4, 643-656.
    • (2010) International Journal of Cyber Criminology , vol.4 , pp. 643-656
    • Bachmann, M.1
  • 3
    • 3242808612 scopus 로고    scopus 로고
    • Retrieved on 14th April 2012 from Computer Security Institute
    • Computer Security Institute. (2012). Computer Crime and Security Survey. Retrieved on 14th April 2012 from http://www.cybercrime.gov/FBI2012.pdf.
    • (2012) Computer Crime and Security Survey
  • 5
    • 11344279136 scopus 로고    scopus 로고
    • Elites, lamers, narcs, and whores: Exploring the computer underground
    • Seattle: Seal Press. L. Cherny & E. R. Weise (Eds.)
    • Gilboa, N. (1996). Elites, lamers, narcs, and whores: Exploring the computer underground. In L. Cherny & E. R. Weise (Eds.) Wired Women (pp. 98-113). Seattle: Seal Press.
    • (1996) Wired Women , pp. 98-113
    • Gilboa, N.1
  • 6
    • 33745758036 scopus 로고    scopus 로고
    • Cambridge, M A: IBM Thomas J. Watson Research Center. Retrieved on 14th April 2012 from
    • Gordon, S. (2000). Virus writers: The end of innocence? Cambridge, M A: IBM Thomas J. Watson Research Center. Retrieved on 14th April 2012 from http://www.research.ibm.com/antivirus/SciPapers/VB2000SG.pdf
    • (2000) Virus writers: The end of innocence?
    • Gordon, S.1
  • 8
    • 33847270657 scopus 로고    scopus 로고
    • Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures
    • Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171-198.
    • (2007) Deviant Behavior , vol.28 , pp. 171-198
    • Holt, T.J.1
  • 9
    • 55149123066 scopus 로고    scopus 로고
    • Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers
    • Upper Saddle River, NJ: Pearson Prentice Hall F. Schmalleger & M. Pittaro (Eds.)
    • Holt, T. J. (2009a). Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 336-355). Upper Saddle River, NJ: Pearson Prentice Hall.
    • (2009) Crimes of the Internet , pp. 336-355
    • Holt, T.J.1
  • 10
    • 77958509140 scopus 로고    scopus 로고
    • Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data
    • Holt, T. J. (2010). Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data. Journal of Criminal Justice Education, 21, 300-321.
    • (2010) Journal of Criminal Justice Education , vol.21 , pp. 300-321
    • Holt, T.J.1
  • 13
    • 77949555353 scopus 로고    scopus 로고
    • Exploring stolen data markets on-line: Products and market forces
    • Holt, T. J., & Lampke, E. (2010). Exploring stolen data markets on-line: Products and market forces. Criminal Justice Studies, 23, 33-50.
    • (2010) Criminal Justice Studies , vol.23 , pp. 33-50
    • Holt, T.J.1    Lampke, E.2
  • 15
    • 77949543969 scopus 로고    scopus 로고
    • Retrieved on 14th April 2012 from Honeynet Research Alliance
    • Honeynet Research Alliance. (2003). Profile: Automated Credit Card Fraud. Retrieved on 14th April 2012 from http://www.honeynet.org/papers/profiles/cc-fraud.pdf.
    • (2003) Profile: Automated Credit Card Fraud
  • 17
    • 84867661512 scopus 로고    scopus 로고
    • Profiling. In The Honeynet Project (2nd Ed.)
    • Addison Wesley Professional
    • Kilger, M., Stutzman, J., & Arkin, O. (2004). Profiling. In The Honeynet Project (2nd Ed.), Know your enemy. Addison Wesley Professional.
    • (2004) Know your enemy
    • Kilger, M.1    Stutzman, J.2    Arkin, O.3
  • 20
    • 78149334726 scopus 로고    scopus 로고
    • Data breaches: What the underground world of "carding" reveals
    • Peretti, K. K. (2009). Data breaches: What the underground world of "carding" reveals. Santa Clara Computer and High Technology Law Journal, 25(2), 375-413.
    • (2009) Santa Clara Computer and High Technology Law Journal , vol.25 , Issue.2 , pp. 375-413
    • Peretti, K.K.1
  • 23
    • 0345257994 scopus 로고    scopus 로고
    • Minneapolis, MN: University of Minnesota Press
    • Thomas, D. (2002). Hacker Culture. Minneapolis, MN: University of Minnesota Press.
    • (2002) Hacker Culture
    • Thomas, D.1
  • 24
    • 70350423437 scopus 로고    scopus 로고
    • The underground economy: Priceless
    • Thomas, R. & Martin, J. (2006). The underground economy: Priceless. The Usenix Magazine, 31, 7-17.
    • (2006) The Usenix Magazine , vol.31 , pp. 7-17
    • Thomas, R.1    Martin, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.