The computer virus eradication act of 1989: the war against computer crime continues
Software Law Journal
Computers under attack: intruders, worms, and viruses
Computers under attack: intruders, worms, and viruses
The worm case: from indictment to verdict
Computers under attack: intruders, worms, and viruses
Computers under attack: intruders, worms, and viruses
Investigating Computer- Related Crime a Handbook for Corporate Investigators
Investigating Computer- Related Crime a Handbook for Corporate Investigators
Crime, Deviance and the Computer
Crime, Deviance and the Computer
Cyberspace Crime
Why Information Security is Hard-An Economic Perspective
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Journal of Computer Security - IFIP 2000
A computer virus spreading model based on resource limitations and interaction costs
Journal of Systems and Software
Hi-index | 0.00 |
This study examines the functionality and propagation patterns of computer viruses, worms, and Trojan horses detected during a 12-month period beginning on January 1, 2004. Using data obtained from threat reports prepared by a major vendor of computer security products, the authors find that these unique forms of cybercrime warrant general concern but that their overall threat to corporate, government, and end computer users thus far has been exaggerated. The authors conclude that greater attention must be paid to the role of the computer user in the spread of viruses and other malicious software and to the small handful of chronic offenders who contribute disproportionately to the problem.