Accesso libero

Modelling Activity of a Malicious User in Computer Networks

INFORMAZIONI SU QUESTO ARTICOLO

Cita

1. Zakaras, M. R. International Computer Crimes. – General Report, Vol. 72, 2001, No 3-4, pp. 813-829. Last access 200021/11/14. https://www.cairn.info/revue-internationale-de-droit-penal-2001-3-page-813.htm10.3917/ridp.723.0813 Search in Google Scholar

2. Brdiczka, O., J. Liu, B. Price, J. Shen. Proactive Insider Threat Detection Through Graph Learning & Psychological Context. Palo Alto Research Centre. http://www.ieee-se-curity.org/TC/SPW2012/proceedings/4740a142.pdf10.1109/SPW.2012.29 Search in Google Scholar

3. Anonymous. The Difference Between Hackers and Crackers. Maximum Security, Indiana: Pearson/Que, 2002. http://www.informit.com/articles/article.aspx?p=30048 Search in Google Scholar

4. Jelen, S. Hacker vs. Cracker. TechRepublic, 14 Oct 2021. https://securitytrails.com/blog/hacker-vs-cracker Search in Google Scholar

5. Passeri, P. Cyber Attack Statistics. Hackmageddon.com, 2014. http://hackmageddon.com/ Search in Google Scholar

6. Chan, S. H. An Empirical Investigation of Hacking Behaviour. – The Review of Business Information Systems, Vol. 9, 2005, No 4, pp. 42-52.10.19030/rbis.v9i4.4443 Search in Google Scholar

7. Weinstein, B. Should You Hire an Ex-Hacker. TechRepublic, 11 June 2002, https://www.techrepublic.com/article/should-you-hire-an-ex-hacker/. Search in Google Scholar

8. Chan, S. H., L. J. Yao. An Exploratory Study on Systems Security and Hacker Hiring. – The Review of Business Information Systems, Vol. 8, 2004, pp. 17-28.10.19030/rbis.v8i4.4473 Search in Google Scholar

9. Lawati, E. A., S. Basha, G. Bhattacharya, J. Hashmi. Mathematical Model and Unitization for the Behaviour of the Intrinsic Recreation Hackers. – International Journal of Innovative Research in Advanced Engineering (IJIRAE), Vol. 1, (2014), No 8. ISSN: 2349-2163. Search in Google Scholar

10. Barber, R. Hackers Profiled – Who Are They and What Are Their Motivations? – Computer Fraud Secur, Vol. 2, 2001, pp. 14-17.10.1016/S1361-3723(01)02017-6 Search in Google Scholar

11. Olson, P. We are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York, Back Bay Books, 2013. Search in Google Scholar

12. Bratus, S. What Hackers Learn That the Rest of Us Don’t Notes on Hacker Curriculum? – IEEE Secur. Priv, Vol. 5, 2007, No 4, pp. 72-75.10.1109/MSP.2007.101 Search in Google Scholar

13. Jaquet-Chiffelle, D. O., M. Loi. Ethical and Unethical Hacking, Part of the International Library of Ethics. – Law and Technology Book Series (ELTE), Vol. 21, 2020. https://link.springer.com/chapter/10.1007/978-3-030-29053-5_910.1007/978-3-030-29053-5_9 Search in Google Scholar

14. Australian Government, Australian Institute of Criminology, Australian High-Tech Crime Centre, 2005. https://www.aic.gov.au/sites/default/files/2020-05/htcb005.pdf. Search in Google Scholar

15. Marshall, A. K. Digital Forensics: Digital Evidence in Criminal Investigations. London, Wiley-Blackwell, 2008. https://www.wiley.com/en-us/Digital+Forensics%3A+Digital+Evidence+in+Criminal+Investigations-p-9780470517741 Search in Google Scholar

16. Mohurle, S., Patil, M. A Brief Study of Wannacry Threat: Ransomware Attack. – International Journal Advance Research Computer Science, Udaipur, Vol. 8, 2017, No 5. https://search.proquest.com/docview/1912631307/abstract/DEF9AE2FF2924E35PQ/ Search in Google Scholar

17. Popchev, I., R. Ketipov, V. Angelovа. Risk Averseness and Emotional Stability in e-Comers. – Cybernetics and Information Technologies, Vol. 21, 2021, No 3, pp. 74-84.10.2478/cait-2021-0030 Search in Google Scholar

18. Popchev, I., I. Radeva. A Decision Support Method for Investment Preference Evaluation. – Cybernetics and Information Technologies, Vol. 6, 2006, No 1, pp. 3-16. Search in Google Scholar

19. Popchev, I., D. Orozova. Towards a Multistep Method for Assessment in e-Learning for Emerging Technologies. – Cybernetics and Information Technologies, Vol. 20, 2020, No 3, pp. 116-129.10.2478/cait-2020-0032 Search in Google Scholar

20. Popchev, I., D. Orozova. Towards Big Data Analytics in the e-Learning Space. – Cybernetics and Information Technologies, Vol. 19, 2019, No 3, pp. 16-24.10.2478/cait-2019-0023 Search in Google Scholar

21. Beebe, N., J. Clark. A Model for Predicting Hacker Behaviour. – Published in AMCIS 1, Psychology, Computer Science, 2006. Search in Google Scholar

22. Lahcen, M., R. A. Caulkins, B. Mohapatra et al. Review and Insight on the Behavioural Aspects of Cybersecurity. – Cybersecurity, Vol. 3, 2020, No 10. https://doi.org/10.1186/s42400-020-00050-w10.1186/s42400-020-00050-w Search in Google Scholar

23. Lee, J. R., T. J. Holt. Assessing the Factors Associated with the Detection of Juvenile Hacking Behaviours. – Front. Psychol, 5 May 2020. https://doi.org/10.3389/fpsyg.2020.0084010.3389/fpsyg.2020.00840721471332431647 Search in Google Scholar

24. Dohren, J. Inside the Mind of a Hacker. 2021. https://www.pwc.ch/en/insights/digital/inside-the-mind-of-a-hacker.html Search in Google Scholar

25. Mednikarov, B., Y. Tsonev, A. Lazarov. Analysis of Cybersecurity Issues in the Maritime Industry. – Information & Security: An International Journal, Vol. 47, 2020, No 1, pp. 27-43. ISSN 0861-5160. https://doi.org/10.11610/isij.470210.11610/isij.4702 Search in Google Scholar

eISSN:
1314-4081
Lingua:
Inglese
Frequenza di pubblicazione:
4 volte all'anno
Argomenti della rivista:
Computer Sciences, Information Technology