text
stringlengths
4
429
http://taosecurity.blogspot.com/2010/01/attribution-using-20-characteristics.html (accessed April 1, 2010).
Burstein, Aaron J. 2008.
Conducting Cybersecurity Research Legally and Ethically,
LEET 2008, San Francisco, CA,
http://www.usenix.org/event/leet08/tech/full_papers/burstein/burstein_html/ (accessed April 1, 2010).
Curle, Adam. 1949.
A Theoretical Approach to Action Research,
Human Relations, 2:3, 269-280.
Choo, Kim-Kwang Raymond, 2008.
Organised Crime Groups in Cyberspace: A Typology,
Trends in Organized Crime, 11:3, 270-295.
Cloppert, Mike. October 14, 2009.
Security Intelligence: Attacking the Kill Chain,
SANS Computer Forensics Investigations and
Incident Response Blog, http://blogs.sans.org/computer-forensics/2009/10/14/security-intelligence-attacking-the-kill-chain/ (accessed
April 1, 2010).
Cooke, Evan., Farnam Jahanian, Danny McPherson. 2005.
The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets,
USENIX, SRUTI 2005, Cambridge, MA, http://www.usenix.org/event/sruti05/tech/cooke.html (accessed April 1, 2010).
Dagon, David, Cliff Zou, and Wenke Lee. 2006.
Modeling Botnet Propagation Using Time Zones,
NDSS 2006, San Diego CA,
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.128.8689&rep=rep1&type=pdf (accessed April 1, 2010).
Defence Research and Development Organisation. February 1, 2009.
Tactical command, control, communication, computer and
intelligence.
Bulletin, http://www.drdo.org/pub/techfocus/2009/feb09.pdf (accessed April 1, 2010).
Deibert, Ronald, and Rafal Rohozinski. 2010.
Risking Security: The policies and paradoxes of cyberspace security,
International
Political Sociology, 4:1, 15-32.
Deloitte & Touche LLP, 2010. Cyber Crime: A Clear and Present Danger Combating the Fastest Growing Cyber Security Threat,
http://www.deloitte.com/assets/Dcom-UnitedStates/Local%20Assets/Documents/AERS/us_aers_Deloitte%20Cyber%20Crime%20
POV%20Jan252010.pdf (accessed April 1, 2010).
F-Secure. 2010.
PDF Based Targeted Attacks are Increasing,
http://www.f-secure.com/weblog/archives/00001903.html
(accessed April 1, 2010).
Frontier India. June 12, 2009.
Artillery Combat Command and Control System SHAKTI dedication to Indian Army.
http://frontierindia.net/artilery-combat-command-and-control-system-shakti-dedication-to-indian-army (accessed April 1, 2010).
Henderson, Scott. 2009a.
CasperNet Gets Punked,
The Dark Visitor blog, http://www.thedarkvisitor.com/tag/lost33 (accessed April 1, 2010).
Henderson, Scott. 2009b.
Hunting the GhostNet Hacker,
The Dark Visitor blog,
http://www.thedarkvisitor.com/2009/04/hunting-the-ghostnet-hacker (accessed April 1, 2010).
Henderson, Scott. 2007a.
Top Chinese Hackers,
The Dark Visitor blog,
http://www.thedarkvisitor.com/2009/04/hunting-the-ghostnet-hacker(accessed April 1, 2010).
Henderson, Scott. 2007b. The Dark Visitor. http://www.lulu.com/items/volume_62/2048000/2048958/4/print/2048958.pdf (accessed
April 1, 2010).
JR03-2010 Shadows in the Cloud - BIBLIOGRAPHY & SUGGESTED READINGS
Higgins, Kelly Jackson. September 24, 2008.
Shadowserver to Build Sinkhole to Find Errant Bots,
Dark Reading,
http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201241 (accessed April 1, 2010).
India Defence. 2007.
Indian Army Tests Indigenous Battlefield Surveillance System,
http://www.india-defence.com/reports-3171
(accessed April 1, 2010).
Indian Embassy. 1998.
National Security Council Setup,
http://www.indianembassy.org/inews/December98/9.htm (accessed April 1, 2010).
Indian Government. 2010.
Overseas.
http://india.gov.in/overseas.php (accessed April 1, 2010).
Jagatic, Tom N., Nathaniel A. Johnson, Markus Jakobsson, and Filippo Menczer. 2007.
Social Phishing,
Communications of the
ACM, 50:10, 94-100,
http://portal.acm.org/citation.cfm?id=1290958.1290968&coll=GUIDE&dl=GUIDE&CFID=74760848&CFTOKEN=96817982
(accessed April 1, 2010).
Keith, Ronald and Zhiqiu Lin. 2005. New Crime in China: Public Order and Human Rights. London: Routledge.
Lam, Willy. November 18, 2009.
Mafias expose China
s legal woes,
Asia Times Online,
http://www.atimes.com/atimes/China/KK18Ad01.html (accessed April 1, 2010).
Lewin, Kurt. 1946.
Action Research and Minority Problems,
Journal of Social Issues, 2, 34-46.
Mandiant, 2010. M Trends: The Advanced Persistent Threat,
http://www.mandiant.com/products/services/m-trends (accessed April 1, 2010).
Markoff, John, and David Barboza. February 18, 2010.
2 China Schools Said to Be Tied to Online Attacks.
New York Times,
http://www.nytimes.com/2010/02/19/technology/19china.html (accessed April 1, 2010).
Nazario, Jose. 2009a.
Twitter-based Botnet Command Channe,
Arbor Networks,
http://asert.arbornetworks.com/2009/08/twitter-based-botnet-command-channel (accessed April 1, 2010).
Nazario, Jose. 2009b.
Malicious Google AppEngine Used as a CnC,
Arbor Networks,
http://asert.arbornetworks.com/2009/11/malicious-google-appengine-used-as-a-cnc (accessed April 1, 2010).
Nolan, Jason, and Michelle Levesque. 2005.
Hacking human: data-archaeology and surveillance in social networks,