text
stringlengths 4
429
|
---|
ACM SIGGROUP
|
Bulletin, 25:2, 33-37,
|
http://portal.acm.org/citation.cfm?id=1067721.1067728&coll=ACM&dl=ACM&CFID=84425230&CFTOKEN=14042216
|
(accessed April 1, 2010).
|
Northrop Grumman. 2009. Capability of the People
|
s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation,
|
http://www.uscc.gov/.../NorthropGrumman_PRC_Cyber_Paper_FINAL_Approved%20Report_16Oct2009.pdf (accessed April 1, 2010).
|
Office Of the Privacy Commissioner of Canada. 2010. Reaching for the Cloud(s):Privacy Issues related to Cloud Computing.
|
http://www.priv.gc.ca/information/pub/cc_201003_e.cfm (accessed April 2, 2010).
|
Parker, Tom, Eric Shaw, Ed Stroz, Matthew G. Devost, and Marcus H. Sachs. 2004. Cyber Adversary Characterization: Auditing the
|
Hacker Mind, Syngress Publishing Inc: Rockland MA.
|
Parker, Tom, Dave Farell, Toby Miller, and Matthew G. Devost. 2003.
|
Adversary Characterization and Scoring Systems,
|
Blackhat
|
2003, Las Vegas, NV. http://www.blackhat.com/presentations/bh-usa-03/bh-us-03-parker.pdf.
|
Ramachandran, Anirudh., Nick Feamster, and David Dagon. 2006.
|
Revealing Botnet Membership Using DNSBL Counter-Intelligence.
|
USENIX, SRUTI 2006, San Jose, CA, http://www.usenix.org/events/sruti06/tech/full_papers/ramachandran/ramachandran.pdf (accessed
|
April 1, 2010).
|
JR03-2010 Shadows in the Cloud - BIBLIOGRAPHY & SUGGESTED READINGS
|
Rajab, Moheeb Abu., Jay Zarfoss, Fabian Monrose, and Andreas Terzis. 2007.
|
My Botnet is Bigger than Yours (Maybe, Better than
|
Yours): Why Size Estimates Remain Challenging
|
. USENIX, Hotbots 2007, Cambridge, MA,
|
http://www.usenix.org/event/hotbots07/tech/full_papers/rajab/rajab.pdf (accessed April 1, 2010).
|
Ratzlav-Katz, Nissan. January 7, 2010.
|
Iron Dome
|
Anti-Missile System Ready for Deployment,
|
Arutz Sheva,
|
http://www.israelnationalnews.com/News/News.aspx/135406 (accessed April 1, 2010).
|
Saikorian Association. Website, www.saikorian.org (accessed April 1, 2010).
|
Smith, Allen M., Nancy Y. Toppel. 2009.
|
Case Study: Using Security Awareness to Combat the Advanced Persistent Threat,
|
13th
|
Colloquium for Information Systems Security Education, Seattle, WA,
|
http://www.cisse2009.com/colloquia/cisse13/proceedings/PDFs/Papers/S03P02.pdf (accessed April 1, 2010).
|
s Land Forces. 2008.
|
Network Centricity: An answer to security threats.
|
http://www.spslandforces.net/news.asp?news=16
|
(accessed April 1, 2010).
|
Stone-Gross, Brett, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and
|
Giovanni Vigna. 2009.
|
Your Botnet is My Botnet: Analysis of a Botnet Takeover,
|
ACM, CCS 2009, Chicago, IL,
|
http://www.cs.ucsb.edu/%7Eseclab/projects/torpig/torpig.pdf (accessed April 1, 2010).
|
Subrahmanyam, Krishnaswamy. January 22, 2010.
|
National Security Advisor: Does India Need One?
|
The Northlines,
|
http://www.northlines.in/newsdet.aspx?q=28365 (accessed April 1, 2010).
|
Symantec. 2010.
|
The Nature of Cyber Espionage: Most Malicious File Types Identified and Encrypted Spam from Rustock,
|
MessageLabs Intelligence, http://www.messagelabs.com/mlireport/MLI_2010_03_Mar_FINAL-EN.pdf (accessed April 1, 2010).
|
Symantec. 2009a.
|
Trojan.Whitewell: What
|
s your (bot) Facebook Status Today?
|
Symantec Security Response Blog,
|
http://www.symantec.com/connect/blogs/trojanwhitewell-what-s-your-bot-facebook-status-today (accessed April 1, 2010).
|
Symantec. 2009b.
|
Google Groups Trojan,
|
Symantec Security Response Blog, http://www.symantec.com/connect/blogs/google-groups-trojan
|
(accessed April 1, 2010).
|
Thibodeau, Patrick, 2010.
|
FBI List Top 10 Posts in Cybercriminal Operations,
|
Computer World,
|
http://www.computerworld.com/s/article/9173965/FBI_lists_Top_10_posts_in_cybercriminal_operations (accessed April 1, 2010).
|
Unmask Parasites. 2009.
|
Hackers Use Twitter API To Trigger Malicious Scripts,
|
http://blog.unmaskparasites.com/2009/11/11/hackers-use-twitter-api-to-trigger-malicious-scripts (accessed April 2, 2010).
|
Vallentin, Matthias, Jon Whiteaker, and Yahel Ben-David. 2009.
|
The Gh0st in the Shell: Network Security in the Himalayas,
|
Berkeley, http://cs.berkeley.edu/~mavam/cw/cs294-28-paper.pdf (accessed April 1, 2010).
|
Van Horenbeeck, Maarten. 2008a.
|
Is Troy Burning? An Overview of Targeted Trojan Attacks,
|
SANS Internet Storm Center, SANSFire
|
2008, Washington DC. http://isc.sans.org/.../SANSFIRE2008-Is_Troy_Burning_Vanhorenbeeck.pdf (accessed April 1, 2010).
|
Van Horenbeeck, Maarten. 2008b.
|
Overview of Cyber Attacks Against Tibetan Communities,
|
Internet Storms Centre,
|
http://isc.sans.org/diary.html?storyid=4177 (accessed April 1, 2010).
|
Van Horenbeeck, Maarten. 2007.
|
Crouching PowerPoint, Hidden Trojan,
|
24th Chaos Communication Congress, Berlin,
|
http://events.ccc.de/congress/2007/Fahrplan/events/2189.en.htm (accessed April 1, 2010).
|
Vass, Lisa. November 8, 2009.
|
RBN Gang Moves Setups Shop in China,
|
eWeek,
|
http://www.eweek.com/c/a/Security/RBN-Gang-Moves-Sets-Up-Shop-in-China/ (accessed April 1, 2010).
|
Villeneuve, Nart. 2010.
|
The
|
Kneber
|
Botnet, Spear Phishing Attacks and Crimeware
|
, Information Warfare Monitor,
|
http://www.infowar-monitor.net/2010/03/the-kneber-botnet-spear-phishing-attacks-and-crimeware/ (accessed April 1, 2010).
|
Zetter, Kim. 2009.
|
Electronic Spy Network Focused on Dalai Lama and Embassy Computers.
|
Wired Magazine, March 28,
|
http://www.wired.com/threatlevel/2009/03/spy-system-focu (accessed April 1, 2010).
|
JR03-2010 Shadows in the Cloud - BIBLIOGRAPHY & SUGGESTED READINGS
|
Zetter, Kim. 2007a.
|
Rogue Nodes turn Tor Anonymizer into Eavesdropper
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.