2007 |
21 | EE | Ken Dunham:
Pump and Dump Scams.
Information Systems Security 16(1): 65-71 (2007) |
20 | EE | Ken Dunham:
OrderGun.A: A Sophisticated Rootkit.
Information Systems Security 16(2): 123-126 (2007) |
19 | EE | Ken Dunham,
Gold Honors:
Mitigating Malicious Code.
Information Systems Security 16(4): 233-238 (2007) |
18 | EE | Ken Dunham:
Reducing Remote Risks within the Enterprise.
Information Systems Security 16(5): 295-299 (2007) |
2006 |
17 | EE | Ken Dunham:
Source Code Implications for Malcode.
Information Systems Security 14(6): 6-10 (2006) |
16 | EE | Ken Dunham:
Money Mules: An Investigative View.
Information Systems Security 15(1): 6-10 (2006) |
15 | EE | Ken Dunham:
The Problem with P2P.
Information Systems Security 15(2): 5-8 (2006) |
14 | EE | Ken Dunham:
MetaFisher: Next-Generation Bots and Phishing.
Information Systems Security 15(5): 2-6 (2006) |
13 | EE | Ken Dunham:
Year of the Rootkit.
Information Systems Security 15(6): 2-6 (2006) |
2005 |
12 | EE | Ken Dunham:
The Power of Intelligence.
Information Systems Security 13(6): 10-14 (2005) |
11 | EE | Ken Dunham:
Battling the Bots.
Information Systems Security 14(2): 6-9 (2005) |
10 | EE | Ken Dunham:
Wireless Worries and Wisdom.
Information Systems Security 14(3): 5-8 (2005) |
9 | EE | Ken Dunham:
Source Code Implications for Malcode.
Information Systems Security 14(5): 10-14 (2005) |
2004 |
8 | EE | Ken Dunham:
EICAR Test File Security Considerations.
Information Systems Security 12(6): 7-11 (2004) |
7 | EE | Ken Dunham:
Why SoBig Is So Big.
Information Systems Security 13(1): 2-7 (2004) |
6 | EE | Ken Dunham:
Phishing Isn't So Sophisticated: Scary!
Information Systems Security 13(2): 2-7 (2004) |
5 | EE | Ken Dunham:
Mydoom Miseries.
Information Systems Security 13(4): 2-5 (2004) |
2003 |
4 | EE | Ken Dunham:
Anna Kournikova Revealed.
Information Systems Security 12(1): 10-16 (2003) |
3 | EE | Ken Dunham:
Four Reasons Why Klez Is Widespread.
Information Systems Security 12(2): 16-20 (2003) |
2 | EE | Ken Dunham:
Evaluating Anti-Virus Software: Which Is Best?
Information Systems Security 12(3): 17-28 (2003) |
1 | EE | Ken Dunham:
The Trouble with Trojans.
Information Systems Security 12(4): 19-28 (2003) |