-
3
-
-
84919574237
-
-
AVG. 2012. AVG Community Powered Threat Report. http://aa-download.avg.com/filedir/news/AVG-Community-Powered-Threat-Report-Q1-2012.pdf
-
(2012)
AVG Community Powered Threat Report
-
-
-
4
-
-
80053548870
-
Rogue-Access-Point Detection: Challenges, Solutions, and Future Directions
-
Beyah, R., and A. Venkataraman. 2011. "Rogue-Access-Point Detection: Challenges, Solutions, and Future Directions." IEEE Security & Privacy 9 (5): 56-61.
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.5
, pp. 56-61
-
-
Beyah, R.1
Venkataraman, A.2
-
5
-
-
84859798125
-
Open Sesame: Design Guidelines for Invisible Passwords
-
Bianchi, A., I. Oakley, and D. Kwon. 2012. "Open Sesame: Design Guidelines for Invisible Passwords." Computer 45 (4): 58-65.
-
(2012)
Computer
, vol.45
, Issue.4
, pp. 58-65
-
-
Bianchi, A.1
Oakley, I.2
Kwon, D.3
-
6
-
-
80955155209
-
Cybercrime and On-line Safety in Cyberspace
-
edited by C. Smith, S. Zhang, and R. Barberet, New York: Routledge
-
Broadhurst, R., and K.-K. R. Choo. 2011. "Cybercrime and On-line Safety in Cyberspace." In Routledge International Handbook of Criminology, edited by C. Smith, S. Zhang, and R. Barberet, 153-165. New York: Routledge.
-
(2011)
Routledge International Handbook of Criminology
, pp. 153-165
-
-
Broadhurst, R.1
Choo, K.-K.R.2
-
7
-
-
70350755355
-
Do You Trust Your Phone?
-
10th International Conference on E-commerce and Web Technologies, Linz, Austria
-
Catiglione, A., R. Prisco, and A. Santis. 2009. "Do You Trust Your Phone?" 10th international conference on e-commerce and web technologies, Linz, Austria, LNCS 5692/2009, 50-61.
-
(2009)
LNCS
, vol.5692
, Issue.2009
, pp. 50-61
-
-
Catiglione, A.1
Prisco, R.2
Santis, A.3
-
8
-
-
84861302816
-
Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals
-
Lyon, France, ACM, 2012
-
Chia, P. H., Y. Yamamoto, and N. Asokan. 2012. "Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals." International World Wide Web Conference Committee, Lyon, France, ACM, 2012, 311-320.
-
(2012)
International World Wide Web Conference Committee
, pp. 311-320
-
-
Chia, P.H.1
Yamamoto, Y.2
Asokan, N.3
-
9
-
-
80955142795
-
The Cyber Threat Landscape: Challenges and Future Research Directions
-
Choo, K.-K. R. 2011a. "The Cyber Threat Landscape: Challenges and Future Research Directions." Computers & Security 30 (8): 719-731.
-
(2011)
Computers & Security
, vol.30
, Issue.8
, pp. 719-731
-
-
Choo, K.-K.R.1
-
10
-
-
80054035972
-
Cyberthreat Landscape Faced by Financial and Insurance Industry
-
Choo, K.-K. R. 2011b. "Cyberthreat Landscape Faced by Financial and Insurance Industry." Trends & Issues in Crime and Criminal Justice 408: 1-6.
-
(2011)
Trends & Issues in Crime and Criminal Justice
, vol.408
, pp. 1-6
-
-
Choo, K.-K.R.1
-
11
-
-
84875157541
-
New Payment Methods: A Review of 2010-2012 FATF Mutual Evaluation Reports
-
Choo, K.-K. R. 2013. "New Payment Methods: A Review of 2010-2012 FATF Mutual Evaluation Reports." Computers& Security 36: 12-26.
-
(2013)
Computers & Security
, vol.36
, pp. 12-26
-
-
Choo, K.-K.R.1
-
12
-
-
84905834871
-
A Conceptual Interdisciplinary Plug-and-Play Cyber Security Framework
-
edited by H. Kaur and X. Tao, New York: Springer
-
Choo, K.-K. R. 2014. "A Conceptual Interdisciplinary Plug-and- Play Cyber Security Framework." In ICTs and the Millennium Development Goals - A United Nations Perspective, edited by H. Kaur and X. Tao, 81-99. New York: Springer.
-
(2014)
ICTs and the Millennium Development Goals - A United Nations Perspective
, pp. 81-99
-
-
Choo, K.-K.R.1
-
13
-
-
0000204509
-
Social Change and Crime Rate Trends: A Routine Activity Approach
-
Cohen, L. E., and M. Felson. 1979. "Social Change and Crime Rate Trends: A Routine Activity Approach." American Sociological Review 44 (4): 588-608.
-
(1979)
American Sociological Review
, vol.44
, Issue.4
, pp. 588-608
-
-
Cohen, L.E.1
Felson, M.2
-
14
-
-
84902243653
-
Enhancing User Privacy on Android Mobile Devices via Permissions Removal
-
IEEE Computer Society Press, 6-9 January 2014
-
Do, Q., B. Martini, and K.-K. R. Choo. 2014. "Enhancing User Privacy on Android Mobile Devices via Permissions Removal." 47th annual Hawaii international conference on system sciences (HICSS 2014), IEEE Computer Society Press, 6-9 January 2014, 5070-5079.
-
(2014)
47th Annual Hawaii International Conference on System Sciences (HICSS 2014)
, pp. 5070-5079
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
17
-
-
80755181021
-
A Survey of Mobile Malware in the Wild
-
ACM, Chicago, IL
-
Felt, A. P., M. Finifter, E. Chin, S. Hanna, and D. Wagner. 2011. "A Survey of Mobile Malware in the Wild." 1st ACM workshop on security and privacy in smartphones and mobile devices, ACM, Chicago, IL, 3-14.
-
(2011)
1st ACM workshop on security and privacy in smartphones and mobile devices
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
19
-
-
84867507824
-
-
F-Secure. 2012. Mobile Threat Report Q1 2012. http://www.fsecure.com/weblog/archives/MobileThreatReport-Q1-2012.pdf
-
(2012)
Mobile Threat Report Q1 2012
-
-
-
20
-
-
84919574236
-
Apple Expels Serial Hacker for Publishing iPhone Exploit
-
8 November
-
Goodin, D. 2011. "Apple Expels Serial Hacker for Publishing iPhone Exploit." The Register 8 November. http://www.theregister.co.uk/2011/11/08/apple-excommunicates-charlie-miller/
-
(2011)
The Register
-
-
Goodin, D.1
-
22
-
-
84919574234
-
Creator of 'Point-and-Click' Wi-Fi Hacking Tool Defends its Release
-
5 November
-
Grubb, B. 2010. "Creator of 'Point-and-Click' Wi-Fi Hacking Tool Defends its Release." Sydney Morning Herald 5 November. http://www.smh.com.au/technology/security/creator-of-pointandclick-wifi-hacking-tool-defends-its-release-20101105-17gon.html
-
(2010)
Sydney Morning Herald
-
-
Grubb, B.1
-
23
-
-
84875598792
-
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy
-
Guinchard, A. 2011. "Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy." Journal of Strategic Security 4 (2): 75-96.
-
(2011)
Journal of Strategic Security
, vol.4
, Issue.2
, pp. 75-96
-
-
Guinchard, A.1
-
24
-
-
84875587046
-
Cloud Computing and its Implications for Cybercrime Investigations in Australia
-
Hooper, C., B. Martini, and K.-K. R. Choo. 2013. "Cloud Computing and its Implications for Cybercrime Investigations in Australia." Computer Law and Security Review 29 (2): 152-163.
-
(2013)
Computer Law and Security Review
, vol.29
, Issue.2
, pp. 152-163
-
-
Hooper, C.1
Martini, B.2
Choo, K.-K.R.3
-
25
-
-
84866720156
-
-
Juniper Networks. 2012. 2011 Mobile Threats Report. http://www.juniper.net/us/en/local/pdf/additional-resources/jnpr-2011-mobile-threats-report.pdf
-
(2012)
2011 Mobile Threats Report
-
-
-
26
-
-
84893656776
-
Information Security in the South Australian Real Estate Industry: A Study of 40 Real Estate Organisations
-
Mani, D., K.-K. R. Choo, and S. Mubarak. 2014. "Information Security in the South Australian Real Estate Industry: A Study of 40 Real Estate Organisations." Information Management and Computer Security 22 (1): 24-41.
-
(2014)
Information Management and Computer Security
, vol.22
, Issue.1
, pp. 24-41
-
-
Mani, D.1
Choo, K.-K.R.2
Mubarak, S.3
-
27
-
-
84889083567
-
Cloud Storage Forensics: OwnCloud as a Case Study
-
Martini, B., and K.-K. R. Choo. 2013. "Cloud Storage Forensics: ownCloud as a Case Study." Digital Investigation 10 (4): 287-299.
-
(2013)
Digital Investigation
, vol.10
, Issue.4
, pp. 287-299
-
-
Martini, B.1
Choo, K.-K.R.2
-
32
-
-
84884589497
-
Forensic Collection of Cloud Storage Data: Does the Act of Collection Result in Changes to the Data or Its Metadata?
-
Quick, D., and K.-K. R. Choo. 2013a. "Forensic Collection of Cloud Storage Data: Does the Act of Collection Result in Changes to the Data or Its Metadata?" Digital Investigation 10 (3): 266-277.
-
(2013)
Digital Investigation
, vol.10
, Issue.3
, pp. 266-277
-
-
Quick, D.1
Choo, K.-K.R.2
-
33
-
-
84875147433
-
Digital Droplets: Microsoft SkyDrive Forensic Data Remnants
-
Quick, D., and K.-K. R. Choo. 2013b. "Digital Droplets: Microsoft SkyDrive Forensic Data Remnants." Future Generation Computer Systems 29 (6): 1378-1394.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.6
, pp. 1378-1394
-
-
Quick, D.1
Choo, K.-K.R.2
-
34
-
-
84877809583
-
Dropbox Analysis: Data Remnants on User Machines
-
Quick, D., and K.-K. R. Choo. 2013c. "Dropbox Analysis: Data Remnants on User Machines." Digital Investigation 10 (1): 3-18.
-
(2013)
Digital Investigation
, vol.10
, Issue.1
, pp. 3-18
-
-
Quick, D.1
Choo, K.-K.R.2
-
35
-
-
85008009657
-
Interview: Software Security in the Real World
-
Sobel, A. E. K., and G. McGraw. 2010. "Interview: Software Security in the Real World." IEEE Computer 43 (9): 47-53.
-
(2010)
IEEE Computer
, vol.43
, Issue.9
, pp. 47-53
-
-
Sobel, A.E.K.1
McGraw, G.2
-
36
-
-
84869206387
-
-
Sophos. 2012. Security Threat Report 2012. http://www.sophos.com/medialibrary/PDFs/other/SophosSecurityThreatReport2012.pdf
-
(2012)
Security Threat Report 2012
-
-
-
37
-
-
84919574233
-
ZTE Score M Scores a Backdoor Vulnerability
-
25 May
-
Sun. 2012. "ZTE Score M Scores a Backdoor Vulnerability." Trend Micro 25 May. http://blog.trendmicro.com/trendlabs-security-intelligence/zte-score-m-scores-a-backdoor-vulnerability/
-
(2012)
Trend Micro
-
-
Sun1
-
38
-
-
84890628545
-
-
Symantec. 2012. Internet Security Threat Report 2011 Trends. http://www.symantec.com/content/en/us/enterprise/other-resources/b-istr-main-report-2011-21239364.en-us.pdf
-
(2012)
Internet Security Threat Report 2011 Trends
-
-
-
39
-
-
84883277322
-
Mobile Device Forensics: A Snapshot
-
Tassone, C., C. Martini, K.-K. R. Choo, and S. Slay. 2013. "Mobile Device Forensics: A Snapshot." Trends & Issues in Crime and Criminal Justice 460: 1-6.
-
(2013)
Trends & Issues in Crime and Criminal Justice
, vol.460
, pp. 1-6
-
-
Tassone, C.1
Martini, C.2
Choo, K.-K.R.3
Slay, S.4
-
41
-
-
85006850453
-
-
TrendMicro. 2012. "Enterprise Readiness of Consumer Mobile Platforms." http://www.trendmicro.com/cloud-content/us/pdfs/business/reports/rpt-enterprise-readiness-consumerization-mobile-platforms.pdf
-
(2012)
Enterprise Readiness of Consumer Mobile Platforms.
-
-
-
42
-
-
84881111823
-
-
Washington, DC: US Government Accountability Office (US GAO)
-
US GAO (US Government Accountability Office). 2012. Cybersecurity: Threats Impacting the Nation. Washington, DC: US Government Accountability Office (US GAO).
-
(2012)
Cybersecurity: Threats Impacting the Nation
-
-
-
43
-
-
34247657469
-
The Novelty of 'Cybercrime': An Assessment in Light of Routine Activity Theory
-
Yar, M. 2005. "The Novelty of 'Cybercrime': An Assessment in Light of Routine Activity Theory." European Journal of Criminology 2 (4): 407-427.
-
(2005)
European Journal of Criminology
, vol.2
, Issue.4
, pp. 407-427
-
-
Yar, M.1
|