关注
Stephen Cobb
Stephen Cobb
Independent Researcher
在 scobb.net 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Mind this Gap: Criminal hacking and the global cybersecurity skills shortage, a critical analysis
S Cobb
Virus Bulletin Conference, 1-8, 2016
472016
Establishing firewall policy
S Cobb
Southcon/96 Conference Record, 198-205, 1996
401996
ICSA firewall policy guide v2. 0
S Cobb
NCSA Security White Paper Series, 1997
311997
Malware is called malicious for a reason: The risks of weaponizing code
S Cobb, A Lee
2014 6th International Conference On Cyber Conflict (CyCon 2014), 71-84, 2014
262014
NCSA Guide to PC and LAN Security
S Cobb
DIANE Publishing Company, 1999
171999
Manual de seguridad para PC y redes locales
S Cobb, JFB Barcena, AJB Aran
McGraw-Hill, 1994
131994
RoT: Ransomware of Things
S Cobb
Trends, 2017
122017
The economics of spam
S Cobb
ePrivacy Group, http://www. spamhelp. org/articles/economics of spam. pdf, 2003
122003
Advancing Accurate and Objective Cybercrime Metrics
S Cobb
J. Nat'l Sec. L. & Pol'y 10, 605, 2019
112019
Security issues in internet commerce
S Cobb
Southcon/96 Conference Record, 186-191, 1996
101996
Using Quattro PRO
S Cobb
McGraw-Hill, Inc., 1990
101990
Cybersecurity and manufacturers: what the costly Chrysler Jeep hack reveals
S Cobb
Retrieved November 15, 2015, 2015
72015
Internet firewalls.
S Cobb
Byte 20 (10), 179-180, 1995
71995
Cybersecurity trends 2019: Privacy and intrusion in the global village
D Harley, L Myers, S Cobb, C Gutierrez
Eset, 2019
52019
Sizing Cybercrime: Incidents and accidents, hints and allegations
S Cobb
Proceedings of the 25th Virus Bulletin International Conference, 2015
52015
Stuxnet, Flamer, Flame, Whatever Name: There’s just no good malware
S Cobb
Доступен на http://blog. eset. com/2012/06/03/stuxnet-flamer-flame-whatever …, 2012
52012
The flip side of the wireless explosion: Dealing with WAP-gap security risks
S Cobb
Webpage [online]. Serverworld: Sun Server Archives: Jan, 2001
52001
Network World
S Cobb
Framingham 14 (27), 53, 1997
51997
Denial of Service
C Cobb, S Cobb
Secure Computing, 58-60, 1997
51997
Penetrating computer systems and networks
C Cobb, S Cobb, ME Kabay, T Crothers
Computer Security Handbook, 15.1-15.42, 2012
42012
系统目前无法执行此操作,请稍后再试。
文章 1–20