text
stringlengths 4
429
|
---|
s Paradise,
|
Wired Magazine,
|
http://www.wired.com/politics/security/news/2007/09/embassy_hack (accessed April 1, 2010).
|
Zetter, Kim. 2007b.
|
Tor Researcher Who Exposed Embassy E-mail Passwords gets Raided by Swedish FBI and CIA,
|
Threat Level, Wired
|
Magazine, http://www.wired.com/threatlevel/2007/11/swedish-researc/#ixzz0ex7BEUYk (accessed April 1, 2010).
|
Suggested Readings
|
Targeted Malware Research
|
Aeon Security Blog. February 8, 2010.
|
Defending Against Advanced Persistent Threats,
|
http://www.theaeonsolution.com/security/?p=231 (accessed April 1, 2010).
|
Aeon Security Blog. February 16, 2010.
|
You Say Advanced I Say Structured,
|
http://www.theaeonsolution.com/security/?p=251 (accessed April 1, 2010).
|
Beecroft, Alexander. 2009. Passive Fingerprinting of Comptuer Network Reconnaissance Tools, Naval Postgraduate School,
|
http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA509167&Location=U2&doc=GetTRDoc.pdf (accessed April 1, 2010).
|
FireEye Malware Intelligence Lab. November 6 2009.
|
Smashing the Mega-d/Ozdok botnet in 24 hours,
|
http://blog.fireeye.com/research/2009/11/smashing-the-ozdok.html (accessed April 1, 2010).
|
McDougal, Monty. 2009.
|
Castle Warrior: Redefining 21st Century Network Defense
|
. 5th Annual Workshop on Cyber Security and
|
Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, Oakridge, TN.
|
http://portal.acm.org/citation.cfm?id=1558607.1558675 (accessed April 1, 2010).
|
Mehta, Neel. March 30, 2010.
|
The Chilling Effects of Malware,
|
Google Online Security Blog,
|
http://googleonlinesecurity.blogspot.com/2010/03/chilling-effects-of-malware.html (accessed April 1, 2010).
|
Van Horenbeeck, Maarten. 2008.
|
Is Troy Burning? An Overview of Targeted Trojan Attacks,
|
SANS Internet Storm Center, SANSFire
|
2008, Washington DC. http://isc.sans.org/SANSFIRE2008-Is_Troy_Burning_Vanhorenbeeck.pdf (accessed April 4, 2010).
|
Van Horenbeeck, Maarten. 2008.
|
Overview of Cyber Attacks Against Tibetan Communities,
|
Internet Storm Centre,
|
http://isc.sans.org/diary.html?storyid=4177 (accessed April 1, 2010).
|
Van Horenbeeck, Maarten. 2007.
|
Crouching PowerPoint, Hidden Trojan,
|
24th Chaos Communication Congress, Berlin,
|
http://events.ccc.de/congress/2007/Fahrplan/events/2189.en.html (accessed April 4, 2010).
|
Cloud Computing Security
|
Armbrust, Michael, et al. 2009.
|
Above the Clouds: A Berkeley View of Cloud Computing,
|
UC Berkeley Reliable Adaptive Distributed
|
Systems Laboratory, http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf (accessed April 1 2010).
|
Jensen, Meiko, Jorg Schwenk, Nils Grushka, and Luigi Lo Iancono. 2009.
|
On Technical Security Issues in Cloud Computing
|
, 2009
|
IEEE International Conference on Cloud Computing, Bangalore India, 109-116,
|
http://www.computer.org/portal/web/csdl/doi/10.1109/CLOUD.2009.60 (accessed April 1 2010).
|
Mansfield-Devine, Steve. 2008.
|
Danger in the clouds,
|
Network Security, 2008:12, 9-11.
|
JR03-2010 Shadows in the Cloud - BIBLIOGRAPHY & SUGGESTED READINGS
|
International Law
|
Radsan, Afsheen John. 2007.
|
The Unresolved Equation of Espionage and International Law,
|
Michigan Journal of International Law,
|
28:597, 596-623.
|
Rajnovic, Damir, 2009.
|
Do We Need a Global CERT?
|
CISCO Security Blogs, http://blogs.cisco.com/security/comments/do_we_
|
need_a_global_cert/ (accessed April 1 2010).
|
Zhu, Li-xin. 2009.
|
Research on the International Law of Information Network Operations,
|
Air Force Engineering University, Xi
|
China, http://en.cnki.com.cn/Article_en/CJFDTOTAL-HBFX200901009.htm (accessed April 1 2010).
|
Chinese Information Warfare, Strategy and Doctrine
|
Bruzdzinski, Jason E. 2004.
|
Demystifying Shashoujian: China
|
Assassin
|
s Mace
|
Concept
|
In Civil-Military Change in China: Elites,
|
Institutes and Ideas After the 16th Party Congress, Andrew Scobell, Larry Wortzel (Eds), 179-218, Strategic Studies Institute: Carlise, PA.
|
Harris, Shane. 2008.
|
China
|
s Cyber-Militia,
|
National Journal. http://www.nationaljournal.com/njmagazine/cs_20080531_6948.php
|
(accessed April 1 2010).
|
Niu Li, Li Jiangzhou, and Xu Duhui. 2000.
|
On Information Warfare Strategems,
|
Zhongguo Junshi Kexue, August 20, 2000, 115-122,
|
in FBIS.
|
Thomas, Timothy L. 2004. Dragon Bytes: Chinese Information-War Theory and Practice, Foreign Military Studies Office: Fort
|
Leavenworth, KS.
|
Wang Baocun, 1997.
|
A Preliminary Analysis of Information Warfare,
|
Zhongguo Junshi Kexue, 102-111.
|
Fusion Methodology and Intelligence
|
Ieva, Christopher S. 2008.
|
The Holistic Targeting (HOT) Methodology as the Means to Improve Information Operations (IO) Target
|
Development and Prioritization,
|
Naval Postgraduate School, Monterey, CA http://www.stormingmedia.us/81/8168/A816884.html (accessed April 1, 2010).
|
Menthe, Lance and Sullivan, Jeffrey, 2008. A RAND Analysis Tool for Intelligence, Surveillance, and Reconnaissance: The Collections
|
Operations Model RAND: Santa Monica, CA.
|
Merten, Steffen. 2009.
|
Employing Data Fusion in Cultural Analysis and Counterinsurgency in Tribal Social Systems,
|
Strategic Insights, 8:3.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.