@incollection{, 670260E813FFFC3F3B4EF1085836FC34 , author={{Md. BaharulIslam} and {ZiaurRahman} and {Daffodil International University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}13121721 } @incollection{b0, , title={{Internet Attack Methods and Internet Security Technology}} , author={{ OAdeyinka }} , booktitle={{Second Asia International Conference on Modelling & Simulation}} , year={2008} } @incollection{b1, , title={{Policy Memorandum: Increase Cyber-Security via Internet Governance, Reporting and Awareness Reforms}} , author={{ FE BAmor }} , journal={{The Journal of Science Policy and Governance}} 2 1 , year={2012} } @book{b2, , title={{Measuring the Cost of Cyber crime}} , author={{ Anderson }} , year={2012} } @book{b3, , title={{Cyber-Criminal Activity and Analysis', White Paper}} , author={{ NAseef }} , year={2005} , publisher={Center for Security & Privacy Solutions} } @book{b4, , title={{Towards Better Definitions and Measures of Internet Security}} , author={{ JAspnes } and { JFeigenbaum } and { MMitzenmacher } and { DParkes }} , year={2003} , note={Position Paper} } @book{b5, , author={{ FMCleveland }} , title={{Cyber Security Issues for Advanced Metering Infrastructure (AMI)}} , publisher={IEEE} , year={2008} } @incollection{b6, , title={{}} , journal={{Comprehensive Study on Cybercrime, UN Office on Drugs and Crime}} , year={February 2013} } @book{b7, , title={{Cybercrime Coming of Age}} , author={{ HDavid }} , year={2010} , note={White paper} } @incollection{b8, , title={{Cyber-security: Cyber Crime Protection Security Act (S. 2111, 112th Congress)-A Legal Analysis}} , author={{ CDoyle }} , journal={{CRS Report for Congress Research Service}} , year={2013} } @incollection{b9, , title={{Cyber security and power system communication-Essential parts of smart grid infrastructure}} , author={{ GNEricsson }} , journal={{IEEE Transactions on Power Delivery}} 3 25 , year={2010} } @book{b10, , title={{}} , author={{ PFrançois } and { Cybercrime } and { WhiteHacktivism } and { McafeePaper } and { Labs }} , year={2010} } @book{b11, , title={{Cyber criminals Today Mirror Legitimate Business Processes}} , author={{ Fortinet }} , year={2013} , note={Cyber crime Report} } @book{b12, , title={{An Examination of Cyber-crime and Cyber-crime Research: Selfcontrol and Routine Activity Theory}} , author={{ KMGrzybowski }} , year={2012} Arizona State University } @book{b13, , title={{How Economics and Information Security Affects Cyber Crime and What It Means in the Context of a Global Recession}} , author={{ PGuerra }} , year={2009} , note={White paper} } @incollection{b14, , title={{Bound to Fail: Why Cyber Security Risk Cannot Simply Be "Managed" Away', Cyber Security series}} , author={{ RLangner } and { PPederson }} , journal={{Foreign Policy at Brookings}} , year={2013} } @book{b15, , title={{Cyber-crime: An annotated bibliography of select foreign-language academic literature}} , author={{ CLibrary }} , year={2009} , address={Federal Research Division, Library of Congress} } @book{b16, , title={{Cyber crime: Issues (Background Paper), Library of Parliament}} , author={{ PLibrary }} , year={2011} , address={Ottawa, Canada} , note={Publication No. 2011-36-E} } @book{b17, , title={{Second Annual Cost of Cyber Crime Study, Benchmark Study of}} , author={{ IPonemon }} , year={2011} , address={U.S. Companies, Research Report} } @book{b18, , title={{Towards a comprehensive Internet security strategy for SMEs}} , author={{ GF ISoftware }} , year={2011} GFI White Paper } @book{b19, , author={{ BSSchaeffer } and { HChan } and { SOgulnick }} , title={{Cyber Crime and Cyber Security}} , year={2009} , note={White paper} }