dblp.uni-trier.dewww.uni-trier.de

Ken Dunham

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
21EEKen Dunham: Pump and Dump Scams. Information Systems Security 16(1): 65-71 (2007)
20EEKen Dunham: OrderGun.A: A Sophisticated Rootkit. Information Systems Security 16(2): 123-126 (2007)
19EEKen Dunham, Gold Honors: Mitigating Malicious Code. Information Systems Security 16(4): 233-238 (2007)
18EEKen Dunham: Reducing Remote Risks within the Enterprise. Information Systems Security 16(5): 295-299 (2007)
2006
17EEKen Dunham: Source Code Implications for Malcode. Information Systems Security 14(6): 6-10 (2006)
16EEKen Dunham: Money Mules: An Investigative View. Information Systems Security 15(1): 6-10 (2006)
15EEKen Dunham: The Problem with P2P. Information Systems Security 15(2): 5-8 (2006)
14EEKen Dunham: MetaFisher: Next-Generation Bots and Phishing. Information Systems Security 15(5): 2-6 (2006)
13EEKen Dunham: Year of the Rootkit. Information Systems Security 15(6): 2-6 (2006)
2005
12EEKen Dunham: The Power of Intelligence. Information Systems Security 13(6): 10-14 (2005)
11EEKen Dunham: Battling the Bots. Information Systems Security 14(2): 6-9 (2005)
10EEKen Dunham: Wireless Worries and Wisdom. Information Systems Security 14(3): 5-8 (2005)
9EEKen Dunham: Source Code Implications for Malcode. Information Systems Security 14(5): 10-14 (2005)
2004
8EEKen Dunham: EICAR Test File Security Considerations. Information Systems Security 12(6): 7-11 (2004)
7EEKen Dunham: Why SoBig Is So Big. Information Systems Security 13(1): 2-7 (2004)
6EEKen Dunham: Phishing Isn't So Sophisticated: Scary! Information Systems Security 13(2): 2-7 (2004)
5EEKen Dunham: Mydoom Miseries. Information Systems Security 13(4): 2-5 (2004)
2003
4EEKen Dunham: Anna Kournikova Revealed. Information Systems Security 12(1): 10-16 (2003)
3EEKen Dunham: Four Reasons Why Klez Is Widespread. Information Systems Security 12(2): 16-20 (2003)
2EEKen Dunham: Evaluating Anti-Virus Software: Which Is Best? Information Systems Security 12(3): 17-28 (2003)
1EEKen Dunham: The Trouble with Trojans. Information Systems Security 12(4): 19-28 (2003)

Coauthor Index

1Gold Honors [19]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)