Cilli C1 Identit y t heft:a new f rontier for hackers and cybercrime 1 Information Systems Cont rol Journal,2005,6:39~42.
[5]
马林.计算机网络犯罪法律问题研究.山西大学2004届法律硕士学位论文,2004. 6.
[6]
江亚平.各国如何打击网络色情犯罪净化网络空间.中国青年报,2004208206.
[7]
李强.互联网新模型和网络地理学.情报杂志,2003,(11):4~6.
[8]
蒋录.国外赛博地理学研究进展.世界地理研究,2002,(3):92~97.
[9]
http://download. visualware. co m/net workmonitoring/index. ht ml
[10]
孙峰华.犯罪地理学研究的新进展.人文地理,2004,(5):60~63.
[11]
Manhee Lee1 Spanning t ree search model to t raceback DDoS at tack using netflow1 International Conference on Securit y and Management2 SAM’03 12003,1:330~333.
[12]
Vann I B. Crime mapping and it s extension to social science analysis. Social Science Co mp uter Review,2001,19(4):471~479.
[13]
Santo s M Y. Geo2spatial data mining in t he analysis of a demograp hic database . Soft Co mp uting,2005,9(5):374~384.
[14]
Rogerson P. Spatial monitoring of geograp hic pat terns:an application to crime analysis. Computers,Environment
[15]
靳慧云.试析网络犯罪案件侦查中的障碍.中国人民公安大学学报,2003,(5):89~92.
[16]
王发曾.城市建筑空间设计的犯罪防控效应.地理研究,2006,25(4):681~690.
[17]
Gordon L A. The 2005 CSI/FBI computer crime and security survey1 Computer Security Journal,2005,21(3):1~22.
[18]
Getis A Drummy. Geograp hic information science and crime analysis. U RISA Journal,2000,12(2):7~14.
[19]
Hendrick J S. Webcat:t he design and implementation of t he Web2based crime analysis toolkit,2004,IEEE Systemsand Information Engineering Design Sympo sium(IEEE Cat1 No1 04 EX785):95~103.
[20]
Yifei Xue1 A decision model for spatial site selection by criminals:a foundation for law enforcement decision support. IEEE Transactions on Systems,Man and Cybernetics,Part C(Applications and Reviews)2003,33(1):78~85.