Mạng WiFi và dịch tễ học phần mềm độc hại
Tóm tắt
Từ khóa
Tài liệu tham khảo
D Mercer Home Network Adoption: Wi-Fi Emerges as Mass Market Phenomenon (Market Report, Strategy Analytics, Newton, MA, 2006).
S Stamm, Z Ramzan, M Jakobsson Drive-by Pharming (Tech Rep 641, Indiana Univ, Bloomington, IN, 2006).
G Ollmann The Pharming Guide (Next Generation Security Software Ltd, Sutton, UK, Tech Rep. (2006).
, eds M Jakobsson, S Myers (Wiley, New York Phishing and Countermeasures: Undertanding the Increasing Problem of Electronic Identity Theft, 2007).
P Akritidis WY Chin VT Lam S Sidiroglou KG Anagnostakis Proximity breeds danger: Emerging threads in metro-area wireless networks. (USENIX Berkeley CA) pp. 323–338 (2007).
S Myers, S Stamm, Practice and prevention of home-router mid-stream injection attacks. IEEE Proc Anti-Phishing Working Group eCrime Research Summit, 2008 (IEEE, Washington, DC, in press. (2008).
P Traynor, K Butler, W Enck, K Borders, P McDaniel Malnets: Large-Scale Malicious Networks via Compromised Wireless Access Points (Network and Security Research Center, Pennsylvania State Univ, State College, PA, Tech Rep NAS-TR-0048-2006. (2006).
A Bittau M Handley J Lackey The final nail in WEP's coffin. (IEEE Comput Soc Washington DC) pp. 386–400 (2006).
M Gast 802.11 Wireless Networks: The Definitive Guide (O'Reilly, Second Ed, Sebastopol, CA, 2005).
DV Klein, Foiling the Cracker: A Survey of, and Improvements to, Password Security. Proc Second USENIX Workshop on Security (USENIX, Berkeley, CA), pp. 5–14 (1990).
J Jeff, Y Alan, B Ross, A Alasdair The Memorability and Security of Passwords—Some Empirical Results (Computer Laboratory, Univ of Cambridge, Cambridge, UK, Tech Rep No. 500. (2000).
RM Anderson, RM May Infectious Diseases of Humans: Dynamics and Control (Oxford Univ Press, Oxford, 1992).
JO Kephart, SR White, Measuring and modeling computer virus prevalence. Proc 1993 IEEE Comput Soc Symp on Res in Security and Privacy (IEEE, Washington, DC, 1993).