text
stringlengths 4
429
|
---|
http://taosecurity.blogspot.com/2010/01/attribution-using-20-characteristics.html (accessed April 1, 2010).
|
Burstein, Aaron J. 2008.
|
Conducting Cybersecurity Research Legally and Ethically,
|
LEET 2008, San Francisco, CA,
|
http://www.usenix.org/event/leet08/tech/full_papers/burstein/burstein_html/ (accessed April 1, 2010).
|
Curle, Adam. 1949.
|
A Theoretical Approach to Action Research,
|
Human Relations, 2:3, 269-280.
|
Choo, Kim-Kwang Raymond, 2008.
|
Organised Crime Groups in Cyberspace: A Typology,
|
Trends in Organized Crime, 11:3, 270-295.
|
Cloppert, Mike. October 14, 2009.
|
Security Intelligence: Attacking the Kill Chain,
|
SANS Computer Forensics Investigations and
|
Incident Response Blog, http://blogs.sans.org/computer-forensics/2009/10/14/security-intelligence-attacking-the-kill-chain/ (accessed
|
April 1, 2010).
|
Cooke, Evan., Farnam Jahanian, Danny McPherson. 2005.
|
The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets,
|
USENIX, SRUTI 2005, Cambridge, MA, http://www.usenix.org/event/sruti05/tech/cooke.html (accessed April 1, 2010).
|
Dagon, David, Cliff Zou, and Wenke Lee. 2006.
|
Modeling Botnet Propagation Using Time Zones,
|
NDSS 2006, San Diego CA,
|
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.128.8689&rep=rep1&type=pdf (accessed April 1, 2010).
|
Defence Research and Development Organisation. February 1, 2009.
|
Tactical command, control, communication, computer and
|
intelligence.
|
Bulletin, http://www.drdo.org/pub/techfocus/2009/feb09.pdf (accessed April 1, 2010).
|
Deibert, Ronald, and Rafal Rohozinski. 2010.
|
Risking Security: The policies and paradoxes of cyberspace security,
|
International
|
Political Sociology, 4:1, 15-32.
|
Deloitte & Touche LLP, 2010. Cyber Crime: A Clear and Present Danger Combating the Fastest Growing Cyber Security Threat,
|
http://www.deloitte.com/assets/Dcom-UnitedStates/Local%20Assets/Documents/AERS/us_aers_Deloitte%20Cyber%20Crime%20
|
POV%20Jan252010.pdf (accessed April 1, 2010).
|
F-Secure. 2010.
|
PDF Based Targeted Attacks are Increasing,
|
http://www.f-secure.com/weblog/archives/00001903.html
|
(accessed April 1, 2010).
|
Frontier India. June 12, 2009.
|
Artillery Combat Command and Control System SHAKTI dedication to Indian Army.
|
http://frontierindia.net/artilery-combat-command-and-control-system-shakti-dedication-to-indian-army (accessed April 1, 2010).
|
Henderson, Scott. 2009a.
|
CasperNet Gets Punked,
|
The Dark Visitor blog, http://www.thedarkvisitor.com/tag/lost33 (accessed April 1, 2010).
|
Henderson, Scott. 2009b.
|
Hunting the GhostNet Hacker,
|
The Dark Visitor blog,
|
http://www.thedarkvisitor.com/2009/04/hunting-the-ghostnet-hacker (accessed April 1, 2010).
|
Henderson, Scott. 2007a.
|
Top Chinese Hackers,
|
The Dark Visitor blog,
|
http://www.thedarkvisitor.com/2009/04/hunting-the-ghostnet-hacker(accessed April 1, 2010).
|
Henderson, Scott. 2007b. The Dark Visitor. http://www.lulu.com/items/volume_62/2048000/2048958/4/print/2048958.pdf (accessed
|
April 1, 2010).
|
JR03-2010 Shadows in the Cloud - BIBLIOGRAPHY & SUGGESTED READINGS
|
Higgins, Kelly Jackson. September 24, 2008.
|
Shadowserver to Build Sinkhole to Find Errant Bots,
|
Dark Reading,
|
http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201241 (accessed April 1, 2010).
|
India Defence. 2007.
|
Indian Army Tests Indigenous Battlefield Surveillance System,
|
http://www.india-defence.com/reports-3171
|
(accessed April 1, 2010).
|
Indian Embassy. 1998.
|
National Security Council Setup,
|
http://www.indianembassy.org/inews/December98/9.htm (accessed April 1, 2010).
|
Indian Government. 2010.
|
Overseas.
|
http://india.gov.in/overseas.php (accessed April 1, 2010).
|
Jagatic, Tom N., Nathaniel A. Johnson, Markus Jakobsson, and Filippo Menczer. 2007.
|
Social Phishing,
|
Communications of the
|
ACM, 50:10, 94-100,
|
http://portal.acm.org/citation.cfm?id=1290958.1290968&coll=GUIDE&dl=GUIDE&CFID=74760848&CFTOKEN=96817982
|
(accessed April 1, 2010).
|
Keith, Ronald and Zhiqiu Lin. 2005. New Crime in China: Public Order and Human Rights. London: Routledge.
|
Lam, Willy. November 18, 2009.
|
Mafias expose China
|
s legal woes,
|
Asia Times Online,
|
http://www.atimes.com/atimes/China/KK18Ad01.html (accessed April 1, 2010).
|
Lewin, Kurt. 1946.
|
Action Research and Minority Problems,
|
Journal of Social Issues, 2, 34-46.
|
Mandiant, 2010. M Trends: The Advanced Persistent Threat,
|
http://www.mandiant.com/products/services/m-trends (accessed April 1, 2010).
|
Markoff, John, and David Barboza. February 18, 2010.
|
2 China Schools Said to Be Tied to Online Attacks.
|
New York Times,
|
http://www.nytimes.com/2010/02/19/technology/19china.html (accessed April 1, 2010).
|
Nazario, Jose. 2009a.
|
Twitter-based Botnet Command Channe,
|
Arbor Networks,
|
http://asert.arbornetworks.com/2009/08/twitter-based-botnet-command-channel (accessed April 1, 2010).
|
Nazario, Jose. 2009b.
|
Malicious Google AppEngine Used as a CnC,
|
Arbor Networks,
|
http://asert.arbornetworks.com/2009/11/malicious-google-appengine-used-as-a-cnc (accessed April 1, 2010).
|
Nolan, Jason, and Michelle Levesque. 2005.
|
Hacking human: data-archaeology and surveillance in social networks,
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.