599
edits
(→Topics) |
(→Topics) |
||
Line 50: | Line 50: | ||
| [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol] [http://transition.fcc.gov/voip/] | | [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol] [http://transition.fcc.gov/voip/] | ||
|- | |- | ||
| <strike>Business Models of the Underground Economy | | <strike>Business Models of the Underground Economy<strike> (assigned to Christopher Menke) | ||
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | | [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | ||
| [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf] | | [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf] |
edits