4.11 参考文献

[1]M.Clayton,Clues about who's behind recent cyber attacks on US banks,The Christian Science Monitor,pp.11,2012.Available:https://search.proquest.com/docview/1081779990.

[2]B.Harrison,E.Svetieva,and A.Vishwanath,Individual processing of phishing emails,Online Information Review,vol.40,(2),pp.265-281,2016.Available:https://search.proquest.com/docview/1776786039.

[3]M.Andress,Network vulnerability assessment management:Eight network scanning tools offer beefed-up management and remediation,Network World,vol.21,(45),pp.48-48,50,52,2004.Available:https://search.proquest.com/docview/215973410.

[4]Nmap:the Network Mapper-Free Security Scanner,Nmap.org,2017.[Online].Available:https://nmap.org/.[Accessed:20-Jul-2017].

[5]Metasploit Unleashed,Offensive-security.com,2017.[Online].Available:https://www.offensive-security.com/metasploit-unleashed/msfvenom/.[Accessed:21-Jul-2017].

[6]Free Download John the Ripper password cracker |,Hacking Tools,2017.[Online].Available:http://www.hackingtools.in/free-download-johnthe-ripper-password-cracker/.[Accessed:21-Jul-2017].

[7]R.Upadhyay,THC-Hydra Windows Install Guide Using Cygwin,HACKING LIKE A PRO,2017.[Online].Available:https://hackinglikeapro.blogspot.co.ke/2014/12/thc-hydra-windows-install-guide-using.html.[Accessed:21-Jul-2017].

[8]S.Wilbanks and S.Wilbanks,WireShark,Digitalized Warfare,2017.[Online].Available:http://digitalizedwarfare.com/2015/09/27/keep-calmand-use-wireshark/.[Accessed:21-Jul-2017].

[9]Packet Collection and WEP Encryption,Attack & Defend Against Wireless Networks-4,Ferruh.mavituna.com,2017.[Online].Available:http://ferruh.mavituna.com/paket-toplama-ve-wep-sifresini-kirmakablosuz-aglara-saldiri-defans-4-oku/.[Accessed:21-Jul-2017].

[10]Hack Like a Pro:How to Find Vulnerabilities for Any Website Using Nikto,WonderHowTo,2017.[Online].Available:https://null-byte.wonderhowto.com/how-to/hack-like-pro-find-vulnerabilities-forany-website-using-nikto-0151729/.[Accessed:21-Jul-2017].

[11]Kismet,Tools.kali.org,2017.[Online].Available:https://tools.kali.org/wireless-attacks/kismet.[Accessed:21-Jul-2017].

[12]A.Iswara,How to Sniff People's Password?(A hacking guide with Cain & Abel-ARP POISONING METHOD),Hxr99.blogspot.com,2017.[Online].Available:http://hxr99.blogspot.com/2011/08/how-to-sniff-peoplespassword-hacking.html.[Accessed:21-Jul-2017].

[13]A.Gouglidis,I.Mavridis,and V.C.Hu,Security policy verification for multidomains in cloud systems,International Journal of Information Security,vol.13,(2),pp.97-111,2014.Available:https://search.proquest.com/docview/1509582424DOI:http://dx.doi.org/10.1007/s10207-013-0205-x.

[14]R.Oliver,Cyber insurance market expected to grow after WannaCry attack,FT.com,2017.Available:https://search.proquest.com/docview/1910380348.

[15]N.Lomas.(Aug 19).Full Ashley Madison Hacked Data Apparently Dumped On Tor.Available:https://search.proquest.com/docview/1705297436.

[16]D.FitzGerald,Hackers Used Yahoo's Own Software Against It in Data Breach;'Forged cookies' allowed access to accounts without password,Wall Street Journal(Online),2016.Available:https://search.proquest.com/docview/1848979099.

[17]R.Sinha,Compromised!Over 32 mn Twitter passwords reportedly hacked Panache],The Economic Times(Online),2016.Available:https://search.proquest.com/docview/1795569034.

[18]T.Bradshaw,Apple's internal systems hacked,FT.Com,2013.Available:https://search.proquest.com/docview/1289037317.

[19]M.Clayton,Stuxnet malware is 'weapon' out to destroy Iran's Bushehr nuclear plant?,The Christian Science Monitor,2010.Available:https://search.proquest.com/docview/751940033.

[20]D.Palmer,How IoT hackers turned a university's network against itself,ZDNet,2017.[Online].Available:http://www.zdnet.com/article/how-iothackers-turned-a-universitys-network-against-itself/.[Accessed:04-Jul-2017].

[21]S.Zhang,The life of an exhacker who is now banned from using the internet,Gizmodo.com,2017.[Online].Available:http://gizmodo.com/the-lifeof-an-ex-hacker-who-is-now-banned-from-using-t-1700074684.[Accessed:04-Jul-2017].

[22]Busted!FBI led to Anonymous hacker after he posts picture of girlfriend's breasts online,Mail Online,2017.[Online].Available:http://www.dailymail.co.uk/news/article-2129257/Higinio-O-Ochoa-III-FBI-led-Anonymous-hacker-girlfriend-posts-picture-breasts-online.html.[Accessed:28-Nov-2017].