메뉴 건너뛰기




Volumn , Issue , 2013, Pages 173-193

Hackers, viruses and malicious software

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85145536300     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4324/9781843929338-11     Document Type: Chapter
Times cited : (14)

References (18)
  • 2
    • 85145528802 scopus 로고    scopus 로고
    • Hackers “aid” Amazon logging scam
    • 15 December 2008
    • BBC (2008) ‘Hackers “aid” Amazon logging scam’, BBC News Online, 15 December 2008. http://news.bbc.co.uk/1/hi/technology/7783257.stm
    • (2008) BBC News Online
  • 4
    • 84887839075 scopus 로고    scopus 로고
    • The Signs, Signifiers and Semiotics of the Successful Semantic Attack
    • St. Juliens/Valletta, Malta, 30 April-2 May 2005
    • Jordan, M. and Goudey, H. (2005) ‘The Signs, Signifiers and Semiotics of the Successful Semantic Attack’, Proceedings of 14th Annual EICAR Conference, St. Juliens/Valletta, Malta, 30 April-2 May 2005, pp. 344-64.
    • (2005) Proceedings of 14th Annual EICAR Conference , pp. 344-364
    • Jordan, M.1    Goudey, H.2
  • 5
    • 85145522736 scopus 로고    scopus 로고
    • Bush doesn’t confront China over alleged Pentagon hack
    • 7 September 2007
    • Keizer, G. (2007) ‘Bush doesn’t confront China over alleged Pentagon hack’, Computerworld, 7 September 2007.
    • (2007) Computerworld
    • Keizer, G.1
  • 8
    • 57349186134 scopus 로고
    • The Conscience of a Hacker
    • 25 September 1986
    • Mentor (1986) ‘The Conscience of a Hacker’, Phrack, volume 1, issue 7, 25 September 1986.
    • (1986) Phrack , vol.1 , Issue.7
  • 9
    • 52149092178 scopus 로고    scopus 로고
    • The evolution of commercial malware development kits and colour-by-numbers custom malware
    • September 2008
    • Ollmann, G. (2008) ‘The evolution of commercial malware development kits and colour-by-numbers custom malware’, Computer Fraud and Security, September 2008:4-7.
    • (2008) Computer Fraud and Security , pp. 4-7
    • Ollmann, G.1
  • 12
    • 85145532776 scopus 로고    scopus 로고
    • Press release, 30 January 2008
    • Sophos (2008) ‘Will you be spewing Storm spam at 10am tomorrow morning?', Press release, 30 January 2008. http://www.sophos.com/pressoffice/news/articles/2008/01/storm-timezone.html
    • (2008) Will you be spewing Storm spam at 10am tomorrow morning?
  • 13
    • 85145530033 scopus 로고    scopus 로고
    • SANS Institute, GIAC, accessed 26 July 2008
    • Stevens, G. (2002) ‘Enhancing Defenses Against Social Engineering’, SANS Institute, GIAC, http://www.giac.org/certified_professionals/practicals/GSEC/570. php (accessed 26 July 2008).
    • (2002) Enhancing Defenses Against Social Engineering
    • Stevens, G.1
  • 14
    • 84900195083 scopus 로고    scopus 로고
    • 5 February 2005
    • Symantec (2005a) W32.Gaobot.CII. Symantec Security Response, 5 February 2005. http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.cii.html
    • (2005) W32.Gaobot.CII. Symantec Security Response
  • 15
    • 84900181467 scopus 로고    scopus 로고
    • 15 April 2005
    • Symantec (2005b) W32.Beagle.BN@mm. Symantec Security Response, 15 April 2005. http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.bn@ mm.html.
    • (2005) W32.Beagle.BN@mm. Symantec Security Response


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.