-
2
-
-
77957695303
-
Organised crime groups in cyberspace: A typology
-
Choo, K.-K. R. 2008. "Organised crime groups in cyberspace: a typology," Trends in Organized Crime 11(3), pp. 270-295.
-
(2008)
Trends In Organized Crime
, vol.11
, Issue.3
, pp. 270-295
-
-
Choo, K.-K.R.1
-
3
-
-
46449097423
-
Criminal exploitation of online systems by organised crime groups
-
Choo, K.-K. R., and Smith, R. G. 2008. "Criminal exploitation of online systems by organised crime groups," Asian Journal of Criminology 3(1), pp. 37-59.
-
(2008)
Asian Journal of Criminology
, vol.3
, Issue.1
, pp. 37-59
-
-
Choo, K.-K.R.1
Smith, R.G.2
-
4
-
-
36849025796
-
-
Research and public policy No 78, Canberra: Australian Institute of Criminology
-
Choo, K.-K. R., Smith, R. G., and McCusker, R. 2007. "Future directions in technology-enabled crime: 2007-2009," Research and public policy No 78, Canberra: Australian Institute of Criminology
-
(2007)
Future Directions In Technology-enabled Crime: 2007-2009
-
-
Choo, K.-K.R.1
Smith, R.G.2
McCusker, R.3
-
6
-
-
33747629222
-
Data exfiltration and covert channels
-
Giani, A., Berk, V. H., and Cybenko, G. V. Year. "Data exfiltration and covert channels," SPIE2006, pp. 1-11.
-
SPIE2006
, pp. 1-11
-
-
Giani, A.1
Berk, V.H.2
Cybenko, G.V.3
-
7
-
-
84912006012
-
Meet "badBIOS," the mysterious Mac and PC malware that jumps airgaps
-
Goodin, D. 2013. "Meet "badBIOS," the mysterious Mac and PC malware that jumps airgaps," Ars Technica.
-
(2013)
Ars Technica
-
-
Goodin, D.1
-
8
-
-
84905979796
-
An example demonstrating binary FSK
-
Ktims, Wikipedia
-
Ktims 2006. "An example demonstrating binary FSK," in Wikipedia Commons, Wikipedia.
-
(2006)
Wikipedia Commons
-
-
-
9
-
-
84862789277
-
Behavioral hearing thresholds between 0.125 and 20 kHz using depth-compensated ear simulator calibration
-
May-Jun
-
Lee, J., Dhar, S., Abel, R., Banakis, R., Grolley, E., Lee, J., Zecker, S., and Siegel, J. 2012. "Behavioral hearing thresholds between 0.125 and 20 kHz using depth-compensated ear simulator calibration," Ear Hear (33:3) May-Jun, pp 315-329.
-
(2012)
Ear Hear
, vol.33
, Issue.3
, pp. 315-329
-
-
Lee, J.1
Dhar, S.2
Abel, R.3
Banakis, R.4
Grolley, E.5
Lee, J.6
Zecker, S.7
Siegel, J.8
-
10
-
-
62349119577
-
-
NSTISSAM TEMPEST 2-95, National Security Telecommunications and Information Systems Security
-
McConnell, J. M. 1995. "Red/Black Installation Guidance," in NSTISSAM TEMPEST 2-95, National Security Telecommunications and Information Systems Security.
-
(1995)
Red/Black Installation Guidance
-
-
McConnell, J.M.1
-
11
-
-
84867834950
-
Deconstructing Flame: The limitations of traditional defences
-
2012:10
-
Munro, K. 2012. "Deconstructing Flame: the limitations of traditional defences," Computer Fraud & Security (2012:10), pp 8-11.
-
(2012)
Computer Fraud & Security
, pp. 8-11
-
-
Munro, K.1
-
12
-
-
84905990219
-
-
New York Times, January 15
-
Sanger, D. E., and Shanker, T. 2014. "N.S.A. Devises Radio Pathway Into Computers," New York Times, January 15, 2014.
-
(2014)
N.S.A. Devises Radio Pathway Into Computers
, pp. 2014
-
-
Sanger, D.E.1
Shanker, T.2
-
13
-
-
63349106731
-
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
-
Yali, L., Corbett, C., Ken, C., Archibald, R., Mukherjee, B., and Ghosal, D. Year. "SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack," Proceedings of the 42nd Hawaii International Conference on System Sciences 2009, pp. 1-10.
-
(2009)
Proceedings of the 42nd Hawaii International Conference On System Sciences
, pp. 1-10
-
-
Yali, L.1
Corbett, C.2
Ken, C.3
Archibald, R.4
Mukherjee, B.5
Ghosal, D.6
|