1 |
Dunham, K. (ed). Mobile Malware Attacks and Defense. Burlington, Syngress Publishing, 2009.
|
2 |
Wasik, M. Criminal Damage and the Computerised Law. New Law Journal, 136(6266), 763, 1986.
|
3 |
Chao, L, Wei, J. and Xin, Z. Botnet: Survey and Case Study. IEEE Computer Society, 1184, 2009.
|
4 |
Gao, Q., Hu, Y., Li, L., Chen, X. and Liu, H. A Novel Computer Architecture to Prevent Destruction by Viruses. J. Comput. Sci. & Technol, 17(3), 241, 2002.
DOI
|
5 |
Baskin, B. et al. Combating Spyware in the Enterprise. Rockland, Syngress Publishing, 2006.
|
6 |
"W95/CIH-10xx" Sophos http://www.sophos.com.
|
7 |
Lemos, R. Virulent Worm Calls into Doubt Our Ability to Protect the Net. CNET News, 2001. http://news.cnet.com.
|
8 |
Zou, C. C., Towsley, D., Gong, W. & Cai, S. Advanced Routing Worm and Its Security Challenges. SIMULATION, 82(1), 75, 2006.
DOI
|
9 |
Virgil and Mandelbaum, A. (translator), The Aenied of Virgil. 35th ed. Berkeley, University of California Press, 2007.
|
10 |
Trusted Integrated Circuits (TRUST). Defense Advanced Research Projects Agency, 2008, http://www.darpa.mil.
|
11 |
Stokes, J. Pentagon Fears Trojans, Kill Switches In Foreign-Made CPUs. ArsTechnica. http://arstechnica.com [2 May 2008]
|
12 |
Navarro, P. and Autry, G. Death by China: Confronting the Dragon - A Global Call to Action. Upper Saddle River, Prentice Hall, 2011.
|
13 |
Freedman, A. Computer Desktop Encyclopedia. eBook edition. Osborne/McGraw-Hill, 2014.
|
14 |
Malware Defense Guide, 2011. http://technet.microsoft.com.
|
15 |
(1986) 83 Cr App R 54.
|
16 |
(1991) 93 Cr App R 25.
|
17 |
Trojans Suspected of Contributing to 2008 Madrid Aircrash. Infosecurity, 8, 2010. http://www.infosecurity-magazine.com.
|
18 |
The Symbian Foundation Community http://www.symbian.org.
|
19 |
Threat Encyclopedia. Trend Micro, 2021. https://www.trendmicro.com/vinfo/us/threat-encyclopedia
|
20 |
Boase, J., Wellman, B. A Plague of Viruses: Biological, Computer and Marketing. Current Sociology, 49(6), 39, 2001.
DOI
|
21 |
Kizza, J. M. A guide to Computer Network Security. Chattanooga, Springer, 2009.
|
22 |
Kleissner, P. Stoned Bootkit. 2010. http://www.stonedvienna.com.
|
23 |
Malware Evolution in 2007. Kaspersky Security Bulletin, 2007. http://www.kaspersky.com.
|
24 |
Avira. http://www.avira.com [December 2010].
|
25 |
Mobile Security Report. Avira, https://www.avira.com/en/mobile-security-report [November 2020].
|
26 |
Gissel, R. The Development and Evaluation of a Computer Crime Investigative Distance-learning Program for the National Cybercrime Training Partnership. New York, MacroTech Press, 2005.
|
27 |
Smith, R. Phlashdance: Discovering Permanent Denial of Service Attacks against Embedded Systems. Presentation Slides. EUSecWest, 2008. http://eusecwest.com.
|
28 |
Wei, Y., Nan, Z., Xinwen, F. & Wei, Z. Self-Disciplinary Worms and Countermeasures: Modeling and Analysis. IEEE Transactions on Parallel and Distributed Systems, 21(10), 1501, 2010.
DOI
|
29 |
Nissenbaum, H. Where Computer Security Meets National Security in Balkin, J. M., Grimmmelmann, J., Katz, E., Kozlovski, N., Wagman, S., and Zarsky, T. (eds). Cybercrime: Digital Cops In A Networked Environment. New York, New York University Press, 2007.
|