-
1
-
-
77954730392
-
-
McAfee, Santa Clara, California
-
S. Baker, S. Waterman and G. Ivanov, In the Crossfire: Critical Infrastructure in the Age of Cyber War, McAfee, Santa Clara, California, 2009.
-
(2009)
The Crossfire: Critical Infrastructure in the Age of Cyber War
-
-
Baker, S.1
Waterman, S.2
Ivanov, G.3
-
3
-
-
84887087707
-
Panetta warns of dire threat of cyberattack on U.S
-
E. Bumiller and T. Shanker, Panetta warns of dire threat of cyberattack on U.S., New York Times, October 11, 2010.
-
(2010)
New York Times
-
-
Bumiller, E.1
Shanker, T.2
-
4
-
-
84894174148
-
Situational crime prevention
-
Environmental Criminology and Crime Analysis, R. Wortley and L. Mazerolle (Eds.), Portland, Oregon
-
R. Clarke, Situational crime prevention, in Environmental Criminology and Crime Analysis, R. Wortley and L. Mazerolle (Eds.), Willan Publishing, Portland, Oregon, pp. 178–194, 2008.
-
(2008)
Willan Publishing
, pp. 178-194
-
-
Clarke, R.1
-
5
-
-
0000204509
-
Social change and crime rate trends: A routine activity approach
-
L. Cohen and M. Felson, Social change and crime rate trends: A routine activity approach, American Sociological Review, vol. 44(4), pp. 588–609, 1979.
-
(1979)
American Sociological Review
, vol.44
, Issue.4
, pp. 588-609
-
-
Cohen, L.1
Felson, M.2
-
7
-
-
84880609979
-
Best practices in exploratory factory analysis: Four recommendations for getting the most from your analysis, Practical Assessment
-
A. Costello and J. Osborne, Best practices in exploratory factory analysis: Four recommendations for getting the most from your analysis, Practical Assessment, Research and Evaluation, vol. 10(7), pp. 173–178, 2005.
-
(2005)
Research and Evaluation
, vol.10
, Issue.7
, pp. 173-178
-
-
Costello, A.1
Osborne, J.2
-
9
-
-
78650062267
-
-
Mountain View, California
-
N. Falliere, L. O’Murchu and E. Chien, W32.Stuxnet Dossier, Symantec, Mountain View, California, 2011.
-
(2011)
W32.Stuxnet Dossier, Symantec
-
-
Falliere, N.1
O’Murchu, L.2
Chien, E.3
-
11
-
-
84925417756
-
Exploratory factor analysis
-
N. Salkind (Ed.), Sage Publications, Thousand Oaks, California
-
N. Grant and L. Fabrigar, Exploratory factor analysis, in Encyclopedia of Measurement and Statistics, N. Salkind (Ed.), Sage Publications, Thousand Oaks, California, pp. 332–335, 2007.
-
(2007)
Encyclopedia of Measurement and Statistics
, pp. 332-335
-
-
Grant, N.1
Fabrigar, L.2
-
13
-
-
77954238840
-
Mixing qualitative and quantitative methods: Triangulation in action
-
T. Jick, Mixing qualitative and quantitative methods: Triangulation in action, Administrative Science Quarterly, vol. 24(4), pp. 602–611, 1979.
-
(1979)
Administrative Science Quarterly
, vol.24
, Issue.4
, pp. 602-611
-
-
Jick, T.1
-
21
-
-
85025152289
-
-
2005, Special Report NCJ 221943, Bureau of Justice Statistics, U.S. Department of Justice, Washington, DC
-
R. Rantala, Cybercrimes Against Businesses, 2005, Special Report NCJ 221943, Bureau of Justice Statistics, U.S. Department of Justice, Washington, DC, 2008.
-
Cybercrimes against Businesses
, vol.2008
-
-
Rantala, R.1
-
22
-
-
75249091463
-
Cybercrimes against critical infrastructures: A study of online criminal organizations and techniques
-
A. Rege, Cybercrimes against critical infrastructures: A study of online criminal organizations and techniques, Criminal Justice Studies, vol. 22(3), pp. 261–271, 2009.
-
(2009)
Criminal Justice Studies
, vol.22
, Issue.3
, pp. 261-271
-
-
Rege, A.1
-
26
-
-
55549116194
-
-
National Institute of Standards and Technology, Gaithersburg, Maryland
-
K. Stouffer, J. Falco and K. Scarfone, Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800-82, National Institute of Standards and Technology, Gaithersburg, Maryland, 2012.
-
(2012)
Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800-82
-
-
Stouffer, K.1
Falco, J.2
Scarfone, K.3
-
27
-
-
84925417743
-
Cyberwar strategy and tactics: An analysis of cyber goals, strategies, tactics and techniques
-
L. Tinnel, O. Saydjari and D. Farrell, Cyberwar strategy and tactics: An analysis of cyber goals, strategies, tactics and techniques, Proceedings of the IEEE SMC Workshop on Information Assurance, pp. 228–234, 2002.
-
(2002)
Proceedings of the IEEE SMC Workshop on Information Assurance
, pp. 228-234
-
-
Tinnel, L.1
Saydjari, O.2
Farrell, D.3
-
28
-
-
84879911354
-
-
Common Cybersecurity Vulnerabilities in Industrial Control Systems, Washington, DC
-
U.S. Department of Homeland Security, Common Cybersecurity Vulnerabilities in Industrial Control Systems, Washington, DC, 2011.
-
(2011)
U.S. Department of Homeland Security
-
-
|