|
[1]B.S. Woodcock, An analysis of MMOG subscription growth—version 23.0, Available from: <http://www.mmogchart. com/> [2]School of Computer Science, Carnegie Mellon, CAPTCHA Project, Available from:<http://www.captcha.net/> [3]A. M. Turing, “Computing Machinery and Intelligence,” Mind 49: 433-460,1950. [4]Pinkas, B. and Sander, T. “Securing passwords against dictionary attacks,” Proceedings of the ACM Computer and Security Conference 2002. [5]Rachna Dhamija and J.D. Tygar, “Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks,” Second International Workshop (HIPs 2005). [6]Philippe Golle, Nicolas Ducheneaut, “Keeping Bots out of Online Games,” ACM International Conference Proceeding Series, Vol. 265, Pages: 262 – 265, 2005. [7]Kuan-Ta Chen, Jhih-Wei Jiang, Polly Huang, Hao-Hua Chu, Chin-Laung Lei, and Wen-Chin Chen, “Identifying MMORPG Bots: A Traffic Analysis Approach,” ACM International Conference Proceeding Series, Vol. 266, 2006. [8]Greg Mori, Jitendra Malik, “Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA,” Computer Vision and Pattern Recognition, IEEE Computer Society Conference, vol. 1, pp. 134-141, June 2003. [9]Jeff Yan, Ahmad Salah El Ahmad, “Breaking Visual CAPTCHAs with Naïve Pattern Recognition Algorithms,” Computer Security Applications Conference, pp. 279-291, Dec. 2007. [10]Sajad Shirali-Shahreza, Ali Movaghar, “A New Anti-Spam Protocol Using CAPTCHA,” Networking, Sensing and Control, IEEE International Conference, Pages: 234-238, 2007. [11]Igor Fischer and Thorsten Herfet, “Visual CAPTCHAs for Document Authentication,” Multimedia Signal Processing, IEEE 8th Workshop, pp. 471-474, Oct. 2006. [12]Henry S. Bairda and Jon L. Bentley, “Implicit CAPTCHAs,” IS&T/SPIE, Document Recognition & Retrieval XII Conference, Jan. 2005. [13]Shirali-Shahreza, Mohammad Shirali-Shahreza, Sajad, “Question-Based CAPTCHA,” Conference on Computational Intelligence and Multimedia Applications, vol. 4, pp. 54-58, Dec. 2007. [14]Wenke Lee, Salvatore J. Stolfo, “Data Mining Approaches for Intrusion Detection,” In Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, January 26-29, 1998. [15]Theuns Verwoerd and Ray Hunt, “Intrusion detection techniques and approaches,” Computer Communications, vol. 25, Issue 15, pp. 1356-1365, Sep. 2002. [16]Monica Chew and J. D. Tygar, “Image Recognition CAPTCHAs,” International information security conference, pp. 268-279, 2004. [17]Market Intelligence Center, Taiwan, Available from: <http://mic.iii.org.tw/intelligence/> [18]Wikipedia foundation, Available from: <http://zh.wikipedia.org/w/index.php?title=%E4%BB%99%E5%A2%83%E4%BC%A0%E8%AF%B4&variant=zh-tw> [19]Gamebase forum, Available from: <http://www.gamebase.com.tw/forum/content.html?sno=75599574> [20]Shiou-hung Chen, “Bot Detection Models and Corresponding Game Security Processes in Computer Online Games,” Master's Thesis, Dept. of Information Management, National Taiwan University of Science and Technology, 2006.
|