Have a personal or library account? Click to login
Modelling Activity of a Malicious User in Computer Networks Cover

Modelling Activity of a Malicious User in Computer Networks

Open Access
|Jun 2022

References

  1. 1. Zakaras, M. R. International Computer Crimes. – General Report, Vol. 72, 2001, No 3-4, pp. 813-829. Last access 200021/11/14. https://www.cairn.info/revue-internationale-de-droit-penal-2001-3-page-813.htm10.3917/ridp.723.0813
  2. 2. Brdiczka, O., J. Liu, B. Price, J. Shen. Proactive Insider Threat Detection Through Graph Learning & Psychological Context. Palo Alto Research Centre. http://www.ieee-se-curity.org/TC/SPW2012/proceedings/4740a142.pdf10.1109/SPW.2012.29
  3. 3. Anonymous. The Difference Between Hackers and Crackers. Maximum Security, Indiana: Pearson/Que, 2002. http://www.informit.com/articles/article.aspx?p=30048
  4. 4. Jelen, S. Hacker vs. Cracker. TechRepublic, 14 Oct 2021. https://securitytrails.com/blog/hacker-vs-cracker
  5. 5. Passeri, P. Cyber Attack Statistics. Hackmageddon.com, 2014. http://hackmageddon.com/
  6. 6. Chan, S. H. An Empirical Investigation of Hacking Behaviour. – The Review of Business Information Systems, Vol. 9, 2005, No 4, pp. 42-52.10.19030/rbis.v9i4.4443
  7. 7. Weinstein, B. Should You Hire an Ex-Hacker. TechRepublic, 11 June 2002, https://www.techrepublic.com/article/should-you-hire-an-ex-hacker/.
  8. 8. Chan, S. H., L. J. Yao. An Exploratory Study on Systems Security and Hacker Hiring. – The Review of Business Information Systems, Vol. 8, 2004, pp. 17-28.10.19030/rbis.v8i4.4473
  9. 9. Lawati, E. A., S. Basha, G. Bhattacharya, J. Hashmi. Mathematical Model and Unitization for the Behaviour of the Intrinsic Recreation Hackers. – International Journal of Innovative Research in Advanced Engineering (IJIRAE), Vol. 1, (2014), No 8. ISSN: 2349-2163.
  10. 10. Barber, R. Hackers Profiled – Who Are They and What Are Their Motivations? – Computer Fraud Secur, Vol. 2, 2001, pp. 14-17.10.1016/S1361-3723(01)02017-6
  11. 11. Olson, P. We are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York, Back Bay Books, 2013.
  12. 12. Bratus, S. What Hackers Learn That the Rest of Us Don’t Notes on Hacker Curriculum? – IEEE Secur. Priv, Vol. 5, 2007, No 4, pp. 72-75.10.1109/MSP.2007.101
  13. 13. Jaquet-Chiffelle, D. O., M. Loi. Ethical and Unethical Hacking, Part of the International Library of Ethics. – Law and Technology Book Series (ELTE), Vol. 21, 2020. https://link.springer.com/chapter/10.1007/978-3-030-29053-5_910.1007/978-3-030-29053-5_9
  14. 14. Australian Government, Australian Institute of Criminology, Australian High-Tech Crime Centre, 2005. https://www.aic.gov.au/sites/default/files/2020-05/htcb005.pdf.
  15. 15. Marshall, A. K. Digital Forensics: Digital Evidence in Criminal Investigations. London, Wiley-Blackwell, 2008. https://www.wiley.com/en-us/Digital+Forensics%3A+Digital+Evidence+in+Criminal+Investigations-p-9780470517741
  16. 16. Mohurle, S., Patil, M. A Brief Study of Wannacry Threat: Ransomware Attack. – International Journal Advance Research Computer Science, Udaipur, Vol. 8, 2017, No 5. https://search.proquest.com/docview/1912631307/abstract/DEF9AE2FF2924E35PQ/
  17. 17. Popchev, I., R. Ketipov, V. Angelovа. Risk Averseness and Emotional Stability in e-Comers. – Cybernetics and Information Technologies, Vol. 21, 2021, No 3, pp. 74-84.10.2478/cait-2021-0030
  18. 18. Popchev, I., I. Radeva. A Decision Support Method for Investment Preference Evaluation. – Cybernetics and Information Technologies, Vol. 6, 2006, No 1, pp. 3-16.
  19. 19. Popchev, I., D. Orozova. Towards a Multistep Method for Assessment in e-Learning for Emerging Technologies. – Cybernetics and Information Technologies, Vol. 20, 2020, No 3, pp. 116-129.10.2478/cait-2020-0032
  20. 20. Popchev, I., D. Orozova. Towards Big Data Analytics in the e-Learning Space. – Cybernetics and Information Technologies, Vol. 19, 2019, No 3, pp. 16-24.10.2478/cait-2019-0023
  21. 21. Beebe, N., J. Clark. A Model for Predicting Hacker Behaviour. – Published in AMCIS 1, Psychology, Computer Science, 2006.
  22. 22. Lahcen, M., R. A. Caulkins, B. Mohapatra et al. Review and Insight on the Behavioural Aspects of Cybersecurity. – Cybersecurity, Vol. 3, 2020, No 10. https://doi.org/10.1186/s42400-020-00050-w10.1186/s42400-020-00050-w
  23. 23. Lee, J. R., T. J. Holt. Assessing the Factors Associated with the Detection of Juvenile Hacking Behaviours. – Front. Psychol, 5 May 2020. https://doi.org/10.3389/fpsyg.2020.0084010.3389/fpsyg.2020.00840721471332431647
  24. 24. Dohren, J. Inside the Mind of a Hacker. 2021. https://www.pwc.ch/en/insights/digital/inside-the-mind-of-a-hacker.html
  25. 25. Mednikarov, B., Y. Tsonev, A. Lazarov. Analysis of Cybersecurity Issues in the Maritime Industry. – Information & Security: An International Journal, Vol. 47, 2020, No 1, pp. 27-43. ISSN 0861-5160. https://doi.org/10.11610/isij.470210.11610/isij.4702
DOI: https://doi.org/10.2478/cait-2022-0018 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 86 - 95
Submitted on: Nov 17, 2021
Accepted on: Mar 31, 2022
Published on: Jun 23, 2022
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2022 Andon D. Lazarov, Petia Petrova, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.