Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-9pm4c Total loading time: 0 Render date: 2024-04-26T16:11:28.116Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  06 April 2017

John Robertson
Affiliation:
Arizona State University
Ahmad Diab
Affiliation:
Arizona State University
Ericsson Marin
Affiliation:
Arizona State University
Eric Nunes
Affiliation:
Arizona State University
Vivin Paliath
Affiliation:
Arizona State University
Jana Shakarian
Affiliation:
Arizona State University
Paulo Shakarian
Affiliation:
Arizona State University
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] Ahmed, Abbasi, Weifeng, Li, Victor, Benjamin, Shiyu, Hu, and Hsinchun, Chen. Descriptive analytics: Examining expert hackers in web forums. In IEEE – Joint Intelligence and Security Informatics Conference (JISIC), pp. 56–63. TheHague, The Netherlands, September 2014.
[2] Lillian, Ablon, Martin C, Libicki, and Andrea A, Golay. Markets for Cybercrime Tools and Stolen Data: Hackers'Bazaar. Rand Corporation, 2014.
[3] Gunes, Acar, Marc, Juarez, Nick, Nikiforakis, Claudia, Diaz, Seda, Gürses, Frank, Piessens, and Bart, Preneel. Fpdetective: Dusting the web for fingerprinters. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS13, pp. 1129–1140, New York, NY, USA, 2013. ACM.
[4] Peter, Apps. A cyber attack turned out the lights on 80,000. what can stop the next one?, 2016. http://blogs.reuters.com/great-debate/2016/04/05/a-cyber-attackturned- out-the-lights-on-80000-what-can-stop-them/ (accessed October 6, 2016).
[5] Arma. Tor security advisory: Old tor browser bundles vulnerable. The Tor Project, August 2013. https://blog.torproject.org/blog/tor-security-advisory-oldtor- browser-bundles-vulnerable (accessed October 6, 2016).
[6] Yossi, Azar and Iftah, Gamzu. Efficient submodular function maximization under linear packing constraints. ICALP, 1:38–50, 2012.Google Scholar
[7] John A., Bargh and Katelyn Y. A., McKenna. The internet and social life. volume 55, pp. 573–590, 2004.
[8] Mikhail, Belkin and Partha, Niyogi. Using manifold structure for partially labelled classification. In Advances in NIPS, volume 15, pp. 929–936. MIT Press. 2003.
[9] Victor A., Benjamin,Weifeng, Li, Thomas J., Holt, and Hsinchun, Chen. Exploring threats and vulnerabilities in hacker web: Forums, irc, and carding shops. In 2015 International Conference on Intelligence and Security Informatics (IEEE), pp. 85–90, Baltimore, MD, USA, May 2015.
[10] Leyla, Bilge and Tudor, Dumitras. Before we knew it: an empirical study of zeroday attacks in the real world. In Proceedings of the 2012 ACM conference on Computer and communications security, pp. 833–844. ACM, 2012.
[11] Christopher M., Bishop and Ilkay, Ulusoy. Object recognition via local patch labelling. In Joab, Winkler, Mahesan, Niranjan, Neil, Lawrence, editors. Deterministic and Statistical Methods in Machine Learning, pp. 1–21, Springer, Berlin, Heidelberg, 2005.
[12] David M, Blei, Andrew, Y Ng, and Michael I, Jordan. Latent dirichlet allocation. the Journal of Machine Learning Research, 3:993–1022, 2003.Google Scholar
[13] Avrim, Blum and Tom, Mitchell. Combining labeled and unlabeled data with cotraining. In Proceedings of the Eleventh Annual Conference on Computational Learning Theory, COLT' 98, pp. 92–100, New York, NY, USA, 1998. ACM.
[14] J. E., Bodford. We Are Legion: Hacktivism as a Product of Deindividuation,Power, and Social Injustice. PhD thesis, Arizona State University, 2015.
[15] Tom, Boellstorff. Coming of Age in Second Life: An Anthropologist Explores the Virtually Human. Princeton University Press, Princeton, NJ, USA, 2008.
[16] Danny, Bradbury. Unveiling the dark web. Network Security, volume 2014, pp. 14–17, 2014.Google Scholar
[17] Jeffrey, Carr. Inside Cyber Warfare: Mapping the Cyber Underworld. O'Reilly Media, Inc. 2011.
[18] Soumen, Chakrabarti, Kunal, Punera, and Mallela, Subramanyam. Accelerated focused crawling through online relevance feedback. In Proceedings of the 11th International Conference on World Wide Web, pp. 148–159. ACM, 2002.
[19] Soumen, Chakrabarti, Martin, Van den Berg, and Byron, Dom. Focused crawling: a new approach to topic-specific web resource discovery. Computer Networks, 31(11):1623–1640, 1999.Google Scholar
[20] Hsinchun, Chen. Dark web: Exploring and Data Mining the Dark Side of the Web , volume 30. Springer Science & Business Media, 2011.
[21] Hsinchun, Chen, Wingyan, Chung, Jialun, Qin, Edna, Reid, Marc, Sageman, and Gabriel, Weimann. Uncovering the dark web: A case study of jihad on the web. Journal of the American Society for Information Science and Technology, volume 59, pp. 1347–1359. 2008.Google Scholar
[22] Hong, Cheng, Zicheng, Liu, and Jie, Yang 0001. Sparsity induced similarity measure for label propagation. In 2009 IEEE 12th International Conference on Computer Vision, pp. 317–324. IEEE, 2009.
[23] Bill, Chu, Thomas J., Holt, and Gail, Joon Ahn. Examining the Creation, Distribution, and Function of Malware On Line. Washington, D.C., 2010. National Institute of Justice.
[24] E., Gabriella Coleman. Ethnographic approaches to digitalmedia. Annual Review of Anthropology, volume 39, pp. 487–505, 2010.Google Scholar
[25] E., Gabriella Coleman. Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton University Press, 2013.
[26] Mandiant Consulting. M-trends 2016 cyber security trends. 2016. https://www. fireeye.com/current-threats/annual-threat-report/mtrends.html (accessed October 6, 2016).
[27] Thomas H, Cormen. Introduction to Algorithms. MIT Press, 2009.
[28] The MITRE Corporation. CVE-2009-1185, 2009.
[29] Corinna, Cortes and Vladimir, Vapnik. Support-vector networks. Machine Learning, volume 20, pp. 273–297, 1995.Google Scholar
[30] R., Dingledine, N., Mathewson, and P., Syverson. Tor: The second-generation onion router. In Proceedings of the 13th Conference on USENIX Security Symposium use serial (Oxford) comma: x, y, and z)— Volume 13, SSYM'04, pp. 21–21, 2004.Google Scholar
[31] Wim B. H. J., van de Donk (ed.). Cyberprotest : New Media, Citizens, and Social Movements. Routledge London; New York, 2004.
[32] David Fackler, N.S.A. breached North Korean networks before Sony attack, officials say, 2015. http://www.nytimes.com/2015/01/19/world/asia/nsa-tappedinto- north-korean-networks-before-sony-attack-officials-say.html (accessed October 6, 2016).
[33] Nicolas, Falliere, Liam O, Murchu, and Eric, Chien. W32. stuxnet dossier. White paper, Symantec Corp., Security Response, 5, 2011.Google Scholar
[34] Uriel, Feige. A threshold of ln n for approximating set cover. J. ACM, 45(4):634–652, July 1998.
[35] Jim, Finkle. Cyber insurance premiums rocket after high-profile attacks, 2016. http://www.reuters.com/article/us-cybersecurity-insurance-insightidUSKCN0S609M20151012 (accessed October 6, 2016).
[36] F, Flammini, A, Gaglione, N, Mazzocca, and C, Pragliola. Detect: a novel framework for the detection of attacks to critical infrastructures. Safety, Reliability and Risk Analysis: Theory, Methods and Applications-Proceedings of ESREL'08, pp. 105–112, 2014.
[37] Tianjun, Fu, Ahmed, Abbasi, and Hsinchun, Chen. A focused crawler for dark web forums. Journal of the American Society for Information Science and Technology, 61(6):1213–1231, 2010.Google Scholar
[38] Yezekael, Hayel and Quanyan, Zhu. Resilient and secure network design for cyber attack-induced cascading link failures in critical infrastructures. In Information Sciences and Systems (CISS), 2015 49th Annual Conference on, pp. 1–3. IEEE, 2015.
[39] Thomas J., Holt. Lone hacks or group cracks: Examining the social organization of computer hackers. In Schmalleger, Frank J., and Michael, Pittaro, editors, Crimes of the Internet, pp. 336–355. Prentice Hall Press, Upper Saddle River, NJ, USA, 1st edition, 2009.
[40] Thomas J., Holt and Bernadette H., Schell. Hackers and Hacking: A Reference Handbook . Contemporary World Issues. ABC-CLIO, LLC, 2013.
[41] Thomas J., Holt, Deborah, Strumsky, Olga, Smirnova, andMax, Kilger. Examining the social networks of malware writers and hackers. International Journal of Cyber Criminology, volume 6, pp. 891–903, 2012.Google Scholar
[42] Thomas J. (ed.), Holt. Crime On-Line—Correlates, Causes, and Context. Caroline Academic Press, 2nd edition, 2013.
[43] Peter, Holtz, Nicole, Kronberger, and Wolfgang, Wagner. Analyzing internet forums: A practical guide. Journal of Media Psychology, volume 24, pp. 55–66, 2012.Google Scholar
[44] Courtenay, Honeycutt and Susan, Herring. Beyond microblogging: Conversation and collaboration via twitter. System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on. IEEE, volume 42, pp. 1–10, 2009.
[45] Alice, Hutchings and Thomas J., Holt. A crime script analysis of the online stolen data market. British Journal of Criminology, volume 55, pp. 596–614, 2014.Google Scholar
[46] K., Jaishankar. Space transition theory of cyber crimes. In Schmalleger, Frank J., and Michael, Pittaro, editors, Crimes of the Internet, pp. 283–301. Prentice Hall Press, Upper Saddle River, NJ, USA, 1st edition, 2009.
[47] Sushil, Jajodia, Anup K, Ghosh, VS, Subrahmanian, Vipin, Swarup, Cliff, Wang, and X, Sean Wang. Moving target defense ii. Application of Game Theoryand Adversarial Modeling. Series: Advances in Information Security, 100:203, 2013.Google Scholar
[48] Sushil, Jajodia, Anup K, Ghosh, Vipin, Swarup, Cliff, Wang, and X, Sean Wang. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, volume 54. Springer Science & Business Media, 2011.
[49] Akshay, Java, Xiaodan, Song, Tim, Finin, and Belle, Tseng. Why we twitter: Understanding microblogging usage and communities. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis,WebKDD/SNA-KDD '07, pp. 56–65, NewYork,NY,USA, 2007. ACM.
[50] Robert E, Johnson III. Survey of SCADA security challenges and potential attack vectors. In Internet Technology and Secured Transactions (ICITST), 2010 International Conference for, pp. 1–5. IEEE, 2010.
[51] Tim, Jordan and Paul, Taylor. A sociology of hackers. The Sociological Review, volume 46, pp. 757–780. Blackwell Publishing Ltd, 1998.
[52] Jeffrey S., Juris. Reflections on occupy everywhere: Social media, public space, and emerging logics of aggregation. American Ethnologist, 39(2):259–279, 2012.Google Scholar
[53] Stamatis, Karnouskos. Stuxnet worm impact on industrial cyber-physical system security. In IECON 2011-37th Annual Conference on IEEE Industrial Electronics Society, pp. 4490–4494. IEEE, 2011.
[54] Swati, Khandelwal. Malware and hacking forum seized, dozens arrested. July 2015. http://thehackernews.com/2015/07/darkode-hacking-forum.html (accessed October 6, 2016). http://thehackernews.com/2016/01/MegalodonHTTPDDoS- Botnet.html (accessed October 6, 2016).
[55] Swati, Khanderwal. Creator of megalodonhttp ddos botnet arrested. January 2016. http://thehackernews.com/2016/01/MegalodonHTTP-DDoS-Botnet.html (accessed October 6, 2016).
[56] Christopher, Kiekintveld, Viliam, Lisý, and Radek, Píbil. Game-theoretic foundations for the strategic use of honeypots in network security. In Sushil, Jajodia, Paulo, Shakarian, V.S., Subrahmanian, Vipin, Swarup, Cliff, Wang, editors, Cyber Warfare—Building the Scientific Foundation, Springer International Publishing, pp. 81–101. 2015.
[57] Bronislaw, Knaster and A, Tarski. Un théoreme sur les fonctions d'ensembles. Ann. Soc. Polon. Math, 6(133):2013134, 1928.Google Scholar
[58] Robert V., Kozinets. Netnography: Doing Ethnographic Research Online. Sage Publications Ltd., 2009.
[59] Brian, Krebs. Target hackers broke in via hvac company—Krebs on security, 2016. https://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvaccompany/ (accessed October 6, 2016).
[60] David, Lacey and Paul M., Salmon. It's dark in there: Using systems analysis to investigate trust and engagement in dark web forums. In D., Harris, editor, Engineering Psychology and Cognitive Ergonomics, volume 9174 of Lecture Notes in Computer Science, pp. 117–128. Springer International Publishing, 2015.
[61] Jure, Leskovec, Andreas, Krause, Carlos, Guestrin, Christos, Faloutsos, Jeanne, VanBriesen, and Natalie, Glance. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420–429. ACM, 2007.
[62] Anat, Levin, Dani, Lischinski, and Yair, Weiss. A closed form solution to natural image matting. In Proceedings of the 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition—Volume 1, CVPR '06, pp. 61–68, Washington, DC, USA, 2006. IEEE Computer Society.
[63] Steven, Levy. Hackers: Heroes of the Computer Revolution. Doubleday, New York, NY, USA, 1984.
[64] Weifeng, Li and Hsinchun, Chen. Identifying top sellers in underground economy using deep learning-based sentiment analysis. In Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint, pp. 64–67, Sept 2014.Google Scholar
[65] Andrea, Locatelli. The offense/defense balance in cyberspace. ISPI Analysis, No. 203, October 2013.Google Scholar
[66] Kong-wei, Lye and Jeannette, M Wing. Game strategies in network security. International Journal of Information Security, 4(1):71–86, 2005.Google Scholar
[67] William, J Lynn III. Defending a new domain. Foreign Affairs, 89(5):97–108, 2010.Google Scholar
[68] Mitch, Macdonald, Richard, Frank, Joseph, Mei, and Bryan, Monk. Identifying digital threats in a hacker web forum. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, ASONAM '15, pp. 926–933, New York, NY, USA, 2015. ACM.
[69] D. E., Mann and S. M., Christey. Towards a Common Enumeration of Vulnerabilities, 1999. http://www.cve.mitre.org/docs/docs-2000/cerias.html (accessed October 6, 2016).
[70] Ericsson, Marin, Ahmad, Diab, and Paulo, Shakarian. Product offerings in malicious hacker markets. IEEE Conference on Intelligence and Security Informatics (ISI-16), 2016.Google Scholar
[71] Stefano, Marrone, Roberto, Nardone, Annarita, Tedesco, Pasquale, D'Amore, Valeria, Vittorini, Roberto, Setola, Francesca, De Cillis, and Nicola, Mazzocca. Vulnerability modeling and analysis for critical infrastructure protection applications. International Journal of Critical Infrastructure Protection, 6(3):217–227, 2013.Google Scholar
[72] Martha, McCaughey and Michael, D. Ayers, editors. Cyberactivism: Online Activism in Theory and Practice. Taylor and Francis, Inc., Bristol, PA, USA, 2003.
[73] H, Brendan McMahan, Geoffrey, J Gordon, and Avrim, Blum. Planning in the presence of cost functions controlled by an adversary. In Proceedings of the Twentieth International Conference On Machine Learning, pp. 536–543, 2003.Google Scholar
[74] Joseph, Mei and Richard, Frank. Sentiment crawling: Extremist content collection through a sentiment analysis guided web-crawler. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, pp. 1024–1027. ACM, 2015.
[75] Filippo, Menczer, Gautam, Pant, and Padmini, Srinivasan. Topical web crawlers: Evaluating adaptive algorithms. ACM Transactions on Internet Technology (TOIT), 4(4):378–419, 2004.Google Scholar
[76] Michel, Minoux. Accelerated greedy algorithms for maximizing submodular set functions. In J., Stoer, editor, Optimization Techniques, volume 7 of Lecture Notes in Control and Information Sciences, pp. 234–243. Springer Berlin Heidelberg, 1978.
[77] Marti, Motoyama, Damon, McCoy, Kirill, Levchenko, Stefan, Savage, and Geoffrey, M. Voelker. An analysis of underground forums. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC '11, pp. 71–80. ACM, New York, NY, USA, 2011.
[78] G.L., Nemhauser, L.A., Wolsey, and M.L., Fisher. An analysis of approximations for maximizing submodular set functions. Mathematical Programming, 14(1):265–294, 1978.Google Scholar
[79] Kien, C Nguyen, Tansu, Alpcan, and Tamer, Başar. Stochastic games for security in networks with interdependent nodes. In Game Theory for Networks, 2009. GameNets' 09. International Conference on, pp. 697–703. IEEE, 2009.
[80] Eric, Nunes, Ahmad, Diab, Andrew, Gunn, Ericsson, Marin, Vineet, Mishra, Vivin, Paliath, John, Robertson, Jana, Shakarian, Amanda, Thart, and Paulo, Shakarian. Darknet and deepnetmining for proactive cybersecurity threat intelligence.IEEE Conference on Intelligence and Security Informatics (ISI-16), 2016.
[81] Federal Bureau of Investigation. Cyber criminal forum taken down— members arrested in 20 countries, July 2015. https://www.fbi.gov/news/stories/cyber-criminal-forum-taken-down (accessed October 6, 2016).
[82] Vivin, Paliath and Paulo, Shakarian. Modeling cyber-attacks on industrial control systems. IEEE Conference on Intelligence and Security Informatics (ISI-16), 2016.
[83] Ben, Plesser.Skilled, cheap Russian hackers power American cybercrime. NBC News, February 2014.
[84] Boris, Podobnik, Davor, Horvatic, Tomislav, Lipic, Matjaz, Perc, Javier, M Buldu, and H, Eugene Stanley. The cost of attack in competing networks. Journal of The Royal Society Interface, 12(112):20150770, 2015.Google Scholar
[85] John, Postill and Sarah, Pink. Social media ethnographie: The digital researcher in a messy web. Media International Australia, volume 145, pp. 123–134, 2012.Google Scholar
[86] Andrew, Quodling. Doxxing, swatting and the new trends in online harassment. The Conversation, April 2015.
[87] William M., Rand. Objective Criteria for the Evaluation of Clustering Methods. Journal of the American Statistical Association, 66(336):846–850, December 1971.Google Scholar
[88] Michael, Rausch, Nathan, Good, and Chris J., Hoofnagle. Searching for indicators of device fingerprinting in the javascript code of popular websites. Proceedings, Midwest Instruction and Computing Symposium, 2014.
[89] John, Robertson, Ahmad, Diab, Ericsson, Marin, Eric, Nunes, Vivin, Paliath, Jana, Shakarian, and Paulo, Shakarian. Darkweb mining and game theory for enhanced cyber threat intelligence. The Cyber Defense Review, volume 2, 2016.Google Scholar
[90] John, Robertson,Vivin, Paliath, Jana, Shakarian,Amanda, Thart, and Paulo, Shakarian. Data driven game theoretic cyber threat mitigation. In Proc. 28th Innovative Applications of Artificial Intelligence (IAAI-16), 2016.
[91] Patrick, Roos, J, Ryan Carr, and Dana, S Nau. Evolution of state-dependent risk preferences. ACM Transactions on Intelligent Systems and Technology (TIST), 1(1):6, 2010.Google Scholar
[92] Sagar, Samtani, Ryan, Chinn, and Hsinchun, Chen. Exploring hacker assets in underground forums. Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on. IEEE, pp. 31–36, May 2015.
[93] Jana, Shakarian, Paulo, Shakarian, and Andrew Ruef. Cyber-attacks and public embarrassment:Asurvey of some notable hacks. Elsevier SciTechConnect, 2015. https://www.researchgate.net/publication/271217696_Cyber_Attacks_and_Public_Embarrassment_A_Survey_of_Some_Notable_Hacks (accessed October 6, 2016).
[94] P., Shakarian and J., Shakarian. Considerations for the development of threat prediction in the cyber domain. AAAI Workshop on Artificial Intelligence for Cyber Security (AICS), 2015.
[95] P., Shakarian, J., Shakarian, and A., Ruef. Introduction to Cyber-Warfare: A Multidisciplinary Approach. Elsevier Science, 2013.
[96] Paulo, Shakarian. The 2008 Russian cyber-campaign against Georgia. Military Review, volume 91, Nov.-Dec., p. 63, 2011.Google Scholar
[97] Paulo, Shakarian. Stuxnet: Cyberwar revolution in military affairs. Small Wars Journal, April 2011. http://smallwarsjournal.com/jrnl/art/stuxnet-cyberwarrevolution-in-military-affairs (accessed October 6, 2016).
[98] Paulo, Shakarian, Hansheng, Lei, and Roy, Lindelauf. Power grid defense against malicious cascading failure. In Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, pp. 813–820. International Foundation for Autonomous Agents and Multiagent Systems, 2014.
[99] Paulo, Shakarian and J., Shakarian. Considerations for the development of threat prediction in the cyber domain. In AAAI-16 Workshop on Artificial Intelligence for Cyber Security, 2016.
[100] Paulo, Shakarian and Jana, Shakarian. Socio-cultural modeling for cyber threat actors. In Workshops at the Thirtieth AAAI Conference on Artificial Intelligence, 2016.
[101] Jeffrey G., Snodgrass. Ethnography of online cultures. In Bernard H., Russell, and Clarence C., Gravlee, editors, Handbook of Methods in Cultural Anthropology, pp. 465–496. Rowman and Littlefield, London, UK, 2015.
[102] Kyle, Soska and Nicolas, Christin. Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In 24th USENIX Security Symposium (USENIX Security 15), pp. 33–48, Washington, D.C., August 2015. USENIX Association.
[103] Siddharth, Sridhar and Manimaran, Govindarasu. Model-based attack detection and mitigation for automatic generation control. Smart Grid, IEEE Transactions on, 5(2):580–591, 2014.Google Scholar
[104] Kevin F., Steinmetz. Craft(y)ness: An ethnographic study of hacking. British Journal of Criminology, 55(1):125–145, 2015.Google Scholar
[105] Kevin F., Steinmetz and Jurgen, Gerber. “It doesn't have to be this way”: Hacker perspectives on privacy. 41(3):29–51, 2015.
[106] L., Stouffer, V., Pilitteri, S., Lightman, M., Abrams, and A., Hahn. Guide to industrial control systems (ICS) security, NIST special publication 800.82, pp. 16–16, 2011.Google Scholar
[107] Milind, Tambe. Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, New York, NY, USA, 1st edition, 2011.
[108] Andrew S., Tanenbaum and David J., Wetherall. Computer Networks. Prentice Hall Press, Upper Saddle River, NJ, USA, 5th edition, 2010.
[109] Paul A., Taylor. From hackers to hacktivists: speed bumps on the global superhighway? New Media and Society, 7(5):625–646, 2005.Google Scholar
[110] Robert W., Taylor, Eric J., Fritsch, and John, Liederbach. Digital Crime and Digital Terrorism. Prentice Hall Press, 3rd edition, 2014.
[111] Sherry, Turkle. The Second Self: Computers and the Human Spirit. Simon and Schuster, Inc., New York, NY, USA, 1984.
[112] US-CERT. GNU Bourne-Again Shell (Bash) “Shellshock” Vulnerability (CVE- 2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014- 6277 and CVE-2014-6278), 2014.
[113] Dan S., Wall. Cybercrime: The Transformation of Crime in the Information Age. Polity, 1st edition, 2007.
[114] Changhu, Wang, Shuicheng, Yan, Lei, Zhang 0001, and Hong-Jiang, Zhang. Multilabel sparse coding for automatic image annotation. In Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on, pp. 1643–1650. IEEE, 2009.
[115] Wang, Wei. Hunting Russian malware author behind Phoenix exploit kit. April 2013. http://thehackernews.com/2013/04/hunting-russian-malware-authorbehind.html (accessed October 6, 2016).
[116] Bryce, Westlake, Martin, Bouchard, and Richard, Frank. Assessing the validity of automated webcrawlers as data collection tools to investigate online child sexual exploitation. Sexual Abuse: A Journal of Research and Treatment, pp. 1–24, 2015.
[117] Kyle, Wilhoit. Killdisk and blackenergy are not just energy sector threats— trendlabs security intelligence blog, 2016. http://blog.trendmicro.com/trendlabssecurity-intelligence/killdisk-and-blackenergy-are-not-just-energy-sector-threats/(accessed October 6, 2016).
[118] Ziming, Zhao, Gail-Joon, Ahn, Hongxin, Hu, and Deepinder, Mahi. Socialimpact: Systematic analysis of underground social dynamics. In Sara, Foresti, Moti, Yung, and Fabio, Martinelli, editors, Esorics, volume 7459 of Lecture Notes in Computer Science, pp. 877–894. Springer, 2012.
[119] Xiaojin, Zhu, John, Lafferty, and Zoubin, Ghahramani. Combining active learning and semi-supervised learning using gaussian fields and harmonic functions. In ICML 2003 Workshop on The Continuum from Labeled to Unlabeled Data in Machine Learning and Data Mining, pp. 58–65, 2003.

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×