- Anderson, R. and Moore, T. The economics of information security. Science 314, 5799 (Oct. 27, 2006), 610--613.Google ScholarCross Ref
- DeMarco, T. Controlling Software Projects: Management, Measurement, and Estimation. Yourdon Press, New York, 1982.Google ScholarDigital Library
- International Energy Agency. CO2 Emissions from Fuel Combustion: Highlights, 2009; http://www.iea.org/co2highlightsGoogle Scholar
- Kalafut, A., Craig, S., and Gupta, M., Malicious hubs: Detecting abnormally malicious autonomous systems. In Proceedings of the 29th Conference on Computer Communications (San Diego, Mar. 15--19, 2010), 1--5. Google ScholarDigital Library
- Li, X. International actions against cybercrime: Networking legal systems in the networked crime scene. Webology 4, 3 (Sept. 2007); http://www.webology.org/2007/v4n3/a45.htmlGoogle Scholar
- McCarthy, B. New economics of sociological criminology. Annual Review of Sociology 28 (2002), 417--442.Google ScholarCross Ref
- Moore, T., Clayton, R., and Anderson, R. The economics of online crime. Journal of Economic Perspectives 23, 3 (Summer 2009), 3--20.Google ScholarCross Ref
- Moscaritolo, A. Border crossing: Fighting international cybercrime. SCMagazine (Sept. 2009); http://www.scmagazine.com/border-crossing-fighting-international-cybercrime/article/148562/Google Scholar
- Png, I.P.L., Wang, C.Y., and Wang, Q.H. The deterrent and displacement effects of information security enforcement: International evidence. Journal of Management Information Systems 25, 2 (Fall 2008), 125--144. Google ScholarDigital Library
- Png, I.P.L. and Wang, Q.H. Information security: Facilitating user precautions vis-à-vis enforcement against attackers. Journal of Management Information Systems 26, 2 (Fall 2009), 97--121. Google ScholarDigital Library
- Schjølberg, S. and Ghernaouti-Hélie, S. A global treaty on cybersecurity and cybercrime. Cybercrimelaw. net, CybercrimeData AS, Norway, 2011; http://www.cybercrimelaw.net/documents/A_Global_Treaty_on_Cybersecurity_and_Cybercrime,_Second_edition_2011.pdfGoogle Scholar
- Soldo, F. Predicting future attacks, Technical Report, 2009; http://www.ece.uci.edu/~athina/PAPERS/dshield-analysis-tr.pdfGoogle Scholar
- Stone-Gross, B., Kruegel, C., Almeroth, K., Moser A., and Kirda, E. FIRE: FInding Rogue nEtworks. In Proceedings of the Annual Computer Security Applications Conference (Honolulu, HI, Dec. 7--11, 2009), 231--240. Google ScholarDigital Library
- Symantec Corp. Global Internet Security Threat Report: Trends for 2009, White Paper. Symantec, Mountain View, CA, Apr. 2010; http://www.symantec.com/business/threatreport/archive.jspGoogle Scholar
- Symantec Corp. Symantec Global Internet Security Threat Report: Trends for July 5-Dec. 5, White Paper. Symantec, Mountain View, CA, Mar. 2006; http://www.symantec.com/business/threatreport/archive.jspGoogle Scholar
- United Nations. United Nations Millennium Development Goals Indicators, 2010; http://mdgs.un.org/unsd/mdg/Data.aspxGoogle Scholar
Index Terms
- A comparative study of cyberattacks
Recommendations
Cyberattacks: Why, What, Who, and How
Enterprises rely extensively on computerized information systems and electronic data in cyberspace to perform their daily activities and business. Today, virtually all public and private organizations connect to and live in cyberspace. As computers, ...
A Comparative Analysis of the Cyberattacks Against Estonia, the United States, and Ukraine: Exemplifying the Evolution of Internet-Supported Warfare
This comparative international case study of cyber warfare provides a context for considering the evolution of cyber technologies as elements of hybrid warfare capable of creating confusion, disrupting communications, and impacting physical ...
Security defense against long-term and stealthy cyberattacks
Highlights- We consider a dynamic game between a defender and a user who can be infected.
- The strategic hacker can stay undetected and steal data for a long time.
- Our equilibrium captures some characteristics of recent cyberattack incidents.
AbstractModern cyberattacks such as advanced persistent threats have become sophisticated. Hackers can stay undetected for an extended time and defenders do not have sufficient countermeasures to prevent advanced cyberattacks. Reflecting on this ...
Comments