![]() | ![]() |
2007 | ||
---|---|---|
21 | EE | Ken Dunham: Pump and Dump Scams. Information Systems Security 16(1): 65-71 (2007) |
20 | EE | Ken Dunham: OrderGun.A: A Sophisticated Rootkit. Information Systems Security 16(2): 123-126 (2007) |
19 | EE | Ken Dunham, Gold Honors: Mitigating Malicious Code. Information Systems Security 16(4): 233-238 (2007) |
18 | EE | Ken Dunham: Reducing Remote Risks within the Enterprise. Information Systems Security 16(5): 295-299 (2007) |
2006 | ||
17 | EE | Ken Dunham: Source Code Implications for Malcode. Information Systems Security 14(6): 6-10 (2006) |
16 | EE | Ken Dunham: Money Mules: An Investigative View. Information Systems Security 15(1): 6-10 (2006) |
15 | EE | Ken Dunham: The Problem with P2P. Information Systems Security 15(2): 5-8 (2006) |
14 | EE | Ken Dunham: MetaFisher: Next-Generation Bots and Phishing. Information Systems Security 15(5): 2-6 (2006) |
13 | EE | Ken Dunham: Year of the Rootkit. Information Systems Security 15(6): 2-6 (2006) |
2005 | ||
12 | EE | Ken Dunham: The Power of Intelligence. Information Systems Security 13(6): 10-14 (2005) |
11 | EE | Ken Dunham: Battling the Bots. Information Systems Security 14(2): 6-9 (2005) |
10 | EE | Ken Dunham: Wireless Worries and Wisdom. Information Systems Security 14(3): 5-8 (2005) |
9 | EE | Ken Dunham: Source Code Implications for Malcode. Information Systems Security 14(5): 10-14 (2005) |
2004 | ||
8 | EE | Ken Dunham: EICAR Test File Security Considerations. Information Systems Security 12(6): 7-11 (2004) |
7 | EE | Ken Dunham: Why SoBig Is So Big. Information Systems Security 13(1): 2-7 (2004) |
6 | EE | Ken Dunham: Phishing Isn't So Sophisticated: Scary! Information Systems Security 13(2): 2-7 (2004) |
5 | EE | Ken Dunham: Mydoom Miseries. Information Systems Security 13(4): 2-5 (2004) |
2003 | ||
4 | EE | Ken Dunham: Anna Kournikova Revealed. Information Systems Security 12(1): 10-16 (2003) |
3 | EE | Ken Dunham: Four Reasons Why Klez Is Widespread. Information Systems Security 12(2): 16-20 (2003) |
2 | EE | Ken Dunham: Evaluating Anti-Virus Software: Which Is Best? Information Systems Security 12(3): 17-28 (2003) |
1 | EE | Ken Dunham: The Trouble with Trojans. Information Systems Security 12(4): 19-28 (2003) |
1 | Gold Honors | [19] |