text
stringlengths
4
429
s Paradise,
Wired Magazine,
http://www.wired.com/politics/security/news/2007/09/embassy_hack (accessed April 1, 2010).
Zetter, Kim. 2007b.
Tor Researcher Who Exposed Embassy E-mail Passwords gets Raided by Swedish FBI and CIA,
Threat Level, Wired
Magazine, http://www.wired.com/threatlevel/2007/11/swedish-researc/#ixzz0ex7BEUYk (accessed April 1, 2010).
Suggested Readings
Targeted Malware Research
Aeon Security Blog. February 8, 2010.
Defending Against Advanced Persistent Threats,
http://www.theaeonsolution.com/security/?p=231 (accessed April 1, 2010).
Aeon Security Blog. February 16, 2010.
You Say Advanced I Say Structured,
http://www.theaeonsolution.com/security/?p=251 (accessed April 1, 2010).
Beecroft, Alexander. 2009. Passive Fingerprinting of Comptuer Network Reconnaissance Tools, Naval Postgraduate School,
http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA509167&Location=U2&doc=GetTRDoc.pdf (accessed April 1, 2010).
FireEye Malware Intelligence Lab. November 6 2009.
Smashing the Mega-d/Ozdok botnet in 24 hours,
http://blog.fireeye.com/research/2009/11/smashing-the-ozdok.html (accessed April 1, 2010).
McDougal, Monty. 2009.
Castle Warrior: Redefining 21st Century Network Defense
. 5th Annual Workshop on Cyber Security and
Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, Oakridge, TN.
http://portal.acm.org/citation.cfm?id=1558607.1558675 (accessed April 1, 2010).
Mehta, Neel. March 30, 2010.
The Chilling Effects of Malware,
Google Online Security Blog,
http://googleonlinesecurity.blogspot.com/2010/03/chilling-effects-of-malware.html (accessed April 1, 2010).
Van Horenbeeck, Maarten. 2008.
Is Troy Burning? An Overview of Targeted Trojan Attacks,
SANS Internet Storm Center, SANSFire
2008, Washington DC. http://isc.sans.org/SANSFIRE2008-Is_Troy_Burning_Vanhorenbeeck.pdf (accessed April 4, 2010).
Van Horenbeeck, Maarten. 2008.
Overview of Cyber Attacks Against Tibetan Communities,
Internet Storm Centre,
http://isc.sans.org/diary.html?storyid=4177 (accessed April 1, 2010).
Van Horenbeeck, Maarten. 2007.
Crouching PowerPoint, Hidden Trojan,
24th Chaos Communication Congress, Berlin,
http://events.ccc.de/congress/2007/Fahrplan/events/2189.en.html (accessed April 4, 2010).
Cloud Computing Security
Armbrust, Michael, et al. 2009.
Above the Clouds: A Berkeley View of Cloud Computing,
UC Berkeley Reliable Adaptive Distributed
Systems Laboratory, http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf (accessed April 1 2010).
Jensen, Meiko, Jorg Schwenk, Nils Grushka, and Luigi Lo Iancono. 2009.
On Technical Security Issues in Cloud Computing
, 2009
IEEE International Conference on Cloud Computing, Bangalore India, 109-116,
http://www.computer.org/portal/web/csdl/doi/10.1109/CLOUD.2009.60 (accessed April 1 2010).
Mansfield-Devine, Steve. 2008.
Danger in the clouds,
Network Security, 2008:12, 9-11.
JR03-2010 Shadows in the Cloud - BIBLIOGRAPHY & SUGGESTED READINGS
International Law
Radsan, Afsheen John. 2007.
The Unresolved Equation of Espionage and International Law,
Michigan Journal of International Law,
28:597, 596-623.
Rajnovic, Damir, 2009.
Do We Need a Global CERT?
CISCO Security Blogs, http://blogs.cisco.com/security/comments/do_we_
need_a_global_cert/ (accessed April 1 2010).
Zhu, Li-xin. 2009.
Research on the International Law of Information Network Operations,
Air Force Engineering University, Xi
China, http://en.cnki.com.cn/Article_en/CJFDTOTAL-HBFX200901009.htm (accessed April 1 2010).
Chinese Information Warfare, Strategy and Doctrine
Bruzdzinski, Jason E. 2004.
Demystifying Shashoujian: China
Assassin
s Mace
Concept
In Civil-Military Change in China: Elites,
Institutes and Ideas After the 16th Party Congress, Andrew Scobell, Larry Wortzel (Eds), 179-218, Strategic Studies Institute: Carlise, PA.
Harris, Shane. 2008.
China
s Cyber-Militia,
National Journal. http://www.nationaljournal.com/njmagazine/cs_20080531_6948.php
(accessed April 1 2010).
Niu Li, Li Jiangzhou, and Xu Duhui. 2000.
On Information Warfare Strategems,
Zhongguo Junshi Kexue, August 20, 2000, 115-122,
in FBIS.
Thomas, Timothy L. 2004. Dragon Bytes: Chinese Information-War Theory and Practice, Foreign Military Studies Office: Fort
Leavenworth, KS.
Wang Baocun, 1997.
A Preliminary Analysis of Information Warfare,
Zhongguo Junshi Kexue, 102-111.
Fusion Methodology and Intelligence
Ieva, Christopher S. 2008.
The Holistic Targeting (HOT) Methodology as the Means to Improve Information Operations (IO) Target
Development and Prioritization,
Naval Postgraduate School, Monterey, CA http://www.stormingmedia.us/81/8168/A816884.html (accessed April 1, 2010).
Menthe, Lance and Sullivan, Jeffrey, 2008. A RAND Analysis Tool for Intelligence, Surveillance, and Reconnaissance: The Collections
Operations Model RAND: Santa Monica, CA.
Merten, Steffen. 2009.
Employing Data Fusion in Cultural Analysis and Counterinsurgency in Tribal Social Systems,
Strategic Insights, 8:3.