共 9 条
[1]
BLAIR MM, 2000, LOS ANGELES TIM 1113, pB7
[2]
Caputo DD, 2008, LECT NOTES COMPUT SC, V5230, P402, DOI 10.1007/978-3-540-87403-4_27
[3]
Cathey R., 2003, P 12 INT C INF KNOWL, P183
[4]
GROSS G, 2006, NETWORK WORLD 0605
[5]
Kowalski E., 2008, US Secret Service and CERT/SEI Insider Threat Study: Illicit cyber activity in the Information Technology and Telecommunications Sector
[6]
Maloof MA, 2007, LECT NOTES COMPUT SC, V4637, P146
[7]
MAYBURY M, 2005, P 2005 INT C INT AN
[8]
Rantala R., 2008, CYBERCRIME BUSINESSE
[9]
Sicilliano C. L. B., 1995, P IEEE ACM SUP 95 C, P56, DOI [10.1109/SUPERC.1995.241777, DOI 10.1109/SUPERC.1995.241777]