text
stringlengths
4
429
ACM SIGGROUP
Bulletin, 25:2, 33-37,
http://portal.acm.org/citation.cfm?id=1067721.1067728&coll=ACM&dl=ACM&CFID=84425230&CFTOKEN=14042216
(accessed April 1, 2010).
Northrop Grumman. 2009. Capability of the People
s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation,
http://www.uscc.gov/.../NorthropGrumman_PRC_Cyber_Paper_FINAL_Approved%20Report_16Oct2009.pdf (accessed April 1, 2010).
Office Of the Privacy Commissioner of Canada. 2010. Reaching for the Cloud(s):Privacy Issues related to Cloud Computing.
http://www.priv.gc.ca/information/pub/cc_201003_e.cfm (accessed April 2, 2010).
Parker, Tom, Eric Shaw, Ed Stroz, Matthew G. Devost, and Marcus H. Sachs. 2004. Cyber Adversary Characterization: Auditing the
Hacker Mind, Syngress Publishing Inc: Rockland MA.
Parker, Tom, Dave Farell, Toby Miller, and Matthew G. Devost. 2003.
Adversary Characterization and Scoring Systems,
Blackhat
2003, Las Vegas, NV. http://www.blackhat.com/presentations/bh-usa-03/bh-us-03-parker.pdf.
Ramachandran, Anirudh., Nick Feamster, and David Dagon. 2006.
Revealing Botnet Membership Using DNSBL Counter-Intelligence.
USENIX, SRUTI 2006, San Jose, CA, http://www.usenix.org/events/sruti06/tech/full_papers/ramachandran/ramachandran.pdf (accessed
April 1, 2010).
JR03-2010 Shadows in the Cloud - BIBLIOGRAPHY & SUGGESTED READINGS
Rajab, Moheeb Abu., Jay Zarfoss, Fabian Monrose, and Andreas Terzis. 2007.
My Botnet is Bigger than Yours (Maybe, Better than
Yours): Why Size Estimates Remain Challenging
. USENIX, Hotbots 2007, Cambridge, MA,
http://www.usenix.org/event/hotbots07/tech/full_papers/rajab/rajab.pdf (accessed April 1, 2010).
Ratzlav-Katz, Nissan. January 7, 2010.
Iron Dome
Anti-Missile System Ready for Deployment,
Arutz Sheva,
http://www.israelnationalnews.com/News/News.aspx/135406 (accessed April 1, 2010).
Saikorian Association. Website, www.saikorian.org (accessed April 1, 2010).
Smith, Allen M., Nancy Y. Toppel. 2009.
Case Study: Using Security Awareness to Combat the Advanced Persistent Threat,
13th
Colloquium for Information Systems Security Education, Seattle, WA,
http://www.cisse2009.com/colloquia/cisse13/proceedings/PDFs/Papers/S03P02.pdf (accessed April 1, 2010).
s Land Forces. 2008.
Network Centricity: An answer to security threats.
http://www.spslandforces.net/news.asp?news=16
(accessed April 1, 2010).
Stone-Gross, Brett, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and
Giovanni Vigna. 2009.
Your Botnet is My Botnet: Analysis of a Botnet Takeover,
ACM, CCS 2009, Chicago, IL,
http://www.cs.ucsb.edu/%7Eseclab/projects/torpig/torpig.pdf (accessed April 1, 2010).
Subrahmanyam, Krishnaswamy. January 22, 2010.
National Security Advisor: Does India Need One?
The Northlines,
http://www.northlines.in/newsdet.aspx?q=28365 (accessed April 1, 2010).
Symantec. 2010.
The Nature of Cyber Espionage: Most Malicious File Types Identified and Encrypted Spam from Rustock,
MessageLabs Intelligence, http://www.messagelabs.com/mlireport/MLI_2010_03_Mar_FINAL-EN.pdf (accessed April 1, 2010).
Symantec. 2009a.
Trojan.Whitewell: What
s your (bot) Facebook Status Today?
Symantec Security Response Blog,
http://www.symantec.com/connect/blogs/trojanwhitewell-what-s-your-bot-facebook-status-today (accessed April 1, 2010).
Symantec. 2009b.
Google Groups Trojan,
Symantec Security Response Blog, http://www.symantec.com/connect/blogs/google-groups-trojan
(accessed April 1, 2010).
Thibodeau, Patrick, 2010.
FBI List Top 10 Posts in Cybercriminal Operations,
Computer World,
http://www.computerworld.com/s/article/9173965/FBI_lists_Top_10_posts_in_cybercriminal_operations (accessed April 1, 2010).
Unmask Parasites. 2009.
Hackers Use Twitter API To Trigger Malicious Scripts,
http://blog.unmaskparasites.com/2009/11/11/hackers-use-twitter-api-to-trigger-malicious-scripts (accessed April 2, 2010).
Vallentin, Matthias, Jon Whiteaker, and Yahel Ben-David. 2009.
The Gh0st in the Shell: Network Security in the Himalayas,
Berkeley, http://cs.berkeley.edu/~mavam/cw/cs294-28-paper.pdf (accessed April 1, 2010).
Van Horenbeeck, Maarten. 2008a.
Is Troy Burning? An Overview of Targeted Trojan Attacks,
SANS Internet Storm Center, SANSFire
2008, Washington DC. http://isc.sans.org/.../SANSFIRE2008-Is_Troy_Burning_Vanhorenbeeck.pdf (accessed April 1, 2010).
Van Horenbeeck, Maarten. 2008b.
Overview of Cyber Attacks Against Tibetan Communities,
Internet Storms Centre,
http://isc.sans.org/diary.html?storyid=4177 (accessed April 1, 2010).
Van Horenbeeck, Maarten. 2007.
Crouching PowerPoint, Hidden Trojan,
24th Chaos Communication Congress, Berlin,
http://events.ccc.de/congress/2007/Fahrplan/events/2189.en.htm (accessed April 1, 2010).
Vass, Lisa. November 8, 2009.
RBN Gang Moves Setups Shop in China,
eWeek,
http://www.eweek.com/c/a/Security/RBN-Gang-Moves-Sets-Up-Shop-in-China/ (accessed April 1, 2010).
Villeneuve, Nart. 2010.
The
Kneber
Botnet, Spear Phishing Attacks and Crimeware
, Information Warfare Monitor,
http://www.infowar-monitor.net/2010/03/the-kneber-botnet-spear-phishing-attacks-and-crimeware/ (accessed April 1, 2010).
Zetter, Kim. 2009.
Electronic Spy Network Focused on Dalai Lama and Embassy Computers.
Wired Magazine, March 28,
http://www.wired.com/threatlevel/2009/03/spy-system-focu (accessed April 1, 2010).
JR03-2010 Shadows in the Cloud - BIBLIOGRAPHY & SUGGESTED READINGS
Zetter, Kim. 2007a.
Rogue Nodes turn Tor Anonymizer into Eavesdropper