-
1
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
A Avizienis, JC Laprie, B Randell and C Landwehr, "Basic Concepts and Taxonomy of Dependable and Secure Computing", IEEE Transactions on Dependable and Secure Computing, Vol. 1, No. 1, 2004, pp 11-33.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.C.2
Randell, B.3
Landwehr, C.4
-
4
-
-
84958261844
-
-
Blizzard
-
Blizzard, "Battle.net Scams", available at http://www.blizzard.com/support/?id=asi0461p.
-
Battle.net Scams
-
-
-
5
-
-
84958261845
-
-
Blizzard
-
Blizzard, "Creating a Secure Password", available at http://www.blizzard.com/support/?id=asi0505p.
-
Creating A Secure Password
-
-
-
6
-
-
84958261846
-
-
Blizzard
-
Blizzard, Starcraft official site, http://www.blizzard.com/starcraft/.
-
Starcraft Official Site
-
-
-
8
-
-
84958256081
-
-
June 27 (in Korean) Also
-
Chosun Ilbo, "Rayegard system developer is punished", June 27, 2001 (in Korean). Also available at http://www.chosun.com/w21data/html/news/200106/200106270431.html.
-
(2001)
Rayegard System Developer Is Punished
-
-
Ilbo, C.1
-
9
-
-
33947324098
-
Why cheating matters: Cheating, game security, and the future of global on-line gaming business
-
SB Davis, "Why Cheating Matters: Cheating, Game Security, and the Future of Global On-line Gaming Business", in Proc. of Game Developer Conference 2001, 2001.
-
(2001)
Proc. of Game Developer Conference 2001
-
-
Davis, S.B.1
-
10
-
-
4243874830
-
-
Hankyoreh May 9 in Korean
-
Hankyoreh, "Online cheating is ubiquitous", May 9, 2001 (in Korean). Also available at http://www.hani.co.kr/section-005100025/2001/05/005100025200105091907004.html.
-
(2001)
Online Cheating Is Ubiquitous
-
-
-
11
-
-
0028514027
-
A taxonomy of computer program security flaws
-
Sept
-
CE Landwehr, AR Bull, JP McDermott and WS Choi, "A taxonomy of computer program security flaws", ACM Computing Surveys, Vol.26 No.3, Sept. 1994. pp211-254.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
14
-
-
0030676601
-
How to systematically classify computer security intrusions
-
Oakland, California, May 4-7, IEEE Computer Society Press
-
U Lindqvist and E Jonsson, "How to Systematically Classify Computer Security Intrusions", in Proceedings of the 1997 IEEE Symposium on Security & Privacy, Oakland, California, May 4-7, 1997. IEEE Computer Society Press. pp154-163.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security & Privacy
, pp. 154-163
-
-
Lindqvist, U.1
Jonsson, E.2
-
15
-
-
0038081423
-
Trends in wide area IP traffic patterns: A view from ames internet exchange
-
Monterey, CA, USA Sept
-
S McCreary and K Claffy, "Trends in Wide Area IP Traffic Patterns: A View from Ames Internet Exchange", in Proceedings of the ITC Specialist Seminar on IP Traffic Modeling, Measurement and Management, Monterey, CA, USA, Sept. 2000.
-
(2000)
Proceedings of the ITC Specialist Seminar on IP Traffic Modeling, Measurement and Management
-
-
McCreary, S.1
Claffy, K.2
-
16
-
-
0002733210
-
The lessons of lucasfilm's habitat
-
M Benedikt (ed.) MIT Press, Cambridge
-
C Morningstar and FR Farmer, "The Lessons of Lucasfilm's Habitat", in Cyberspace: First Steps, M Benedikt (ed.), MIT Press, Cambridge, 1990.
-
(1990)
Cyberspace: First Steps
-
-
Morningstar, C.1
Farmer, F.R.2
-
17
-
-
0036149616
-
Computer go
-
Special issue on Games, Computers and AI January
-
M Müller, "Computer Go", Artificial Intelligence, Vol.134, No.1-2 (Special issue on Games, Computers and AI), January 2002, pp145-179.
-
(2002)
Artificial Intelligence
, vol.134
, Issue.1-2
, pp. 145-179
-
-
Müller, M.1
-
18
-
-
0000565716
-
A summary of computer misuse techniques
-
Baltimore, MD
-
PG Neumann and DB Parker, "A Summary of Computer Misuse Techniques", in Proc. of the 12th National Computer Security Conference, Baltimore, MD, 1989, pp. 396-407.
-
(1989)
Proc. of the 12th National Computer Security Conference
, pp. 396-407
-
-
Neumann, P.G.1
Parker, D.B.2
-
19
-
-
0008915229
-
How to hurt the hackers: The scoop on internet cheating and how you can combat It
-
February
-
M Pritchard, "How to Hurt the Hackers: The Scoop on Internet Cheating and How You Can Combat It", Information Security Bulletin, February 2001.
-
(2001)
Information Security Bulletin
-
-
Pritchard, M.1
-
20
-
-
39749151399
-
Conceptual model and architecture of MAFTIA
-
February
-
D Powell and RJ Stroud (Editors), "Conceptual Model and Architecture of MAFTIA", MAFTA Project Deliverable D21, February 2003 (available from http://www.maftia.org).
-
(2003)
MAFTA Project Deliverable D21
-
-
Powell, D.1
Stroud, R.J.2
-
21
-
-
84944757170
-
-
unpublished manuscript
-
E Raymond, "The Case of the Quake Cheats", unpublished manuscript, 1999. Available at http://www.catb.org/~esr/writings/quake-cheats.html.
-
(1999)
The Case of the Quake Cheats
-
-
Raymond, E.1
-
22
-
-
0036239741
-
Security issues in online games
-
A previous version appears in Proc. of International Conference on Application and Development of Computer Games, City University of Hong Kong, Nov. 2001
-
J Yan and HJ Choi, "Security Issues in Online Games", The Electronic Library, Vol. 20, No.2, 2002. A previous version appears in Proc. of International Conference on Application and Development of Computer Games, City University of Hong Kong, Nov. 2001.
-
(2002)
The Electronic Library
, vol.20
, Issue.2
-
-
Yan, J.1
Choi, H.J.2
|