-
1
-
-
79952639454
-
Security sleuths work overtime to confound Conficker
-
Mar. 30
-
R. Adhikari, "Security sleuths work overtime to confound Conficker," TechNews- World, Mar. 30, 2009; http://www.technewsworld. com/story/66666.html.
-
(2009)
TechNews- World
-
-
Adhikari, R.1
-
2
-
-
79952653893
-
Belarus: A telling cyberattack
-
A. Amirzai, "Belarus: A telling cyberattack," Stratfor Global Intelligence, 2008; http://www.stratfor.com/analysis/belarus-telling- cyberattack.
-
(2008)
Stratfor Global Intelligence
-
-
Amirzai, A.1
-
3
-
-
79952666973
-
-
Jan. 4 http://cyberstrategies.wordpress. com/2009/01/14/cyberwar-emerges- amid-theisraeli- palestinian-conflict-in-gaza/
-
M. Amona, "Cyberwar emerges amid the Israeli-Palestinian conflict in Gaza," h t t p : / /cyberstrategies.wordpress.com/, Jan. 4, 2009; http://cyberstrategies.wordpress. com/2009/01/14/cyberwar-emerges-amid- theisraeli- palestinian-conflict-in-gaza/.
-
(2009)
Cyberwar Emerges Amid the Israeli-Palestinian Conflict in Gaza
-
-
Amona, M.1
-
5
-
-
84979212021
-
Cross-cultural conf lict (Conflict Resolution)
-
Oxford, U.K.: Eolss
-
K. Avruch, "Cross-cultural conf lict" (Conflict Resolution), in Encyclopedia of Life Support Systems (EOLSS). Oxford, U.K.: Eolss, 2002.
-
(2002)
Encyclopedia of Life Support Systems (EOLSS)
-
-
Avruch, K.1
-
6
-
-
65249178821
-
Forensics is so 'yesterday'
-
M.A. Caloyannides, "Forensics is so 'yesterday'," IEEE Security & Privacy, vol. 7, no. 2, pp. 18-25, 2009.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.2
, pp. 18-25
-
-
Caloyannides, M.A.1
-
7
-
-
79952684374
-
Japanese textbook dispute sparks cyber-attack
-
CNN, Mar. 31
-
CNN, "Japanese textbook dispute sparks cyber-attack," CNN.com, Mar. 31, 2001; http://edition.cnn.com/2001/WORLD/asiapcf/ east/03/31/japan. korea.website/index.html.
-
(2001)
CNN.com
-
-
-
8
-
-
79952673264
-
China analysts dismiss cyberespionage claims
-
CNN
-
CNN, "China analysts dismiss cyberespionage claims," CNN.com, 2009, http:// www.cnn.com/2009/TECH/03/30/ghostnet. cyber.espionage/.
-
(2009)
CNN.com
-
-
-
9
-
-
79952661393
-
Japan declared a cyberwar against S. Korea
-
CCRC staff, Mar. 22
-
CCRC staff, "Japan declared a cyberwar against S. Korea," Computer Crime Research Center, Mar. 22, 2005; http://www.crimeresearch. org/news/22.03.2005/1067/.
-
(2005)
Computer Crime Research Center
-
-
-
11
-
-
78651111678
-
Coordinated Russia vs Georgia cyber-attack in progress
-
Aug. 11
-
D. Danchev, "Coordinated Russia vs Georgia cyber-attack in progress," Zero Day, Aug. 11, 2008; http://blogs.zdnet.com/ security/?p=1670.
-
(2008)
Zero Day
-
-
Danchev, D.1
-
13
-
-
48349094169
-
Active Cyber-attack model for network system's vulnerability assessment
-
J. Eom, Y. Han, et al. "Active Cyber-attack model for network system's vulnerability assessment," in Proc. Int. Conf. Information Science and Security, 2008, pp. 153-158.
-
(2008)
Proc. Int. Conf. Information Science and Security
, pp. 153-158
-
-
Eom, J.1
Han, Y.2
-
14
-
-
79952682272
-
The art of cyber warfare, Part 1: The digital battlefield
-
J. Germain, "The art of cyber warfare, Part 1: The digital battlefield," TechNews- World, 2008; http://www.technewsworld.com/ rsstory/62779.html.
-
(2008)
TechNews- World
-
-
Germain, J.1
-
15
-
-
79952684225
-
Navy aircraft not a 'spy plane,' DoD says
-
G. Gilmore, "Navy aircraft not a 'spy plane,' DoD says," American Forces Press Service, 2001, http://www.defenselink.mil/news/ newsarticle.aspx?id=45042.
-
(2001)
American Forces Press Service
-
-
Gilmore, G.1
-
16
-
-
70549106029
-
Electricity grid in U.S. penetrated by spies
-
Apr. 8
-
S. Gorman, "Electricity grid in U.S. penetrated by spies," Wall Street J., Apr. 8, 2009; http://online.wsj.com/article/ SB123914805204099085. html.
-
(2009)
Wall Street J
-
-
Gorman, S.1
-
17
-
-
0029491415
-
Emerging challenge: Security and safety in cyberspace
-
R. Hundley and R. Anderson, "Emerging challenge: Security and safety in cyberspace," IEEE Technology & Society Mag., vol. 14, no. 4, pp. 19-28, 1996.
-
(1996)
IEEE Technology & Society Mag.
, vol.14
, Issue.4
, pp. 19-28
-
-
Hundley, R.1
Anderson, R.2
-
19
-
-
79952671451
-
-
Globalsecurity.org
-
S. Herman, "VOA's Steve Herman reports from Tokyo," Globalsecurity.org, 2005; http:// www.globalsecurity.org/security/ library/ news/2005/01/sec-050106-3f7c3184.htm.
-
(2005)
VOA's Steve Herman Reports from Tokyo
-
-
Herman, S.1
-
20
-
-
79952681622
-
Cyber-espionage moves into B2B
-
Jan. 15
-
M. Hines, "Cyber-espionage moves into B2B," InfoWorld, Jan. 15, 2008; http://www.infoworld. com/t/business/cyber-espionage-movesb2b- 546?page=0,0.
-
(2008)
InfoWorld
-
-
Hines, M.1
-
22
-
-
79952652212
-
-
HSdailyWire.com, May 8
-
HSdailyWire.com, "Virginia medical records hijacking;" May 8, 2009; http:// homelandsecuritynewswire.com/virginiamedical- records-hijacking- update.
-
(2009)
Virginia Medical Records Hijacking
-
-
-
24
-
-
49749101200
-
Cyberattack modeling and simulation for network security analysis
-
M.E. Kuhl, J. Kistner, et al. "Cyberattack modeling and simulation for network security analysis," in Proc. Winter Simulation Conf., 2007, pp. 1180 -1188.
-
(2007)
Proc. Winter Simulation Conf
, pp. 1180-1188
-
-
Kuhl, M.E.1
Kistner, J.2
-
25
-
-
60049085301
-
Cyberpandemics: History, inevitability, response
-
P. Laplante, B. Michael, and J. Voas, "Cyberpandemics: History, inevitability, response," IEEE Security & Privacy, vol. 7, no. 1, pp. 63-67, 2009.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.1
, pp. 63-67
-
-
Laplante, P.1
Michael, B.2
Voas, J.3
-
26
-
-
79952638506
-
Cyber warfare seen through a mariner's spyglass
-
J. Laprise, "Cyber warfare seen through a mariner's spyglass," IEEE Technology & Society Mag., 2005.
-
(2005)
IEEE Technology & Society Mag
-
-
Laprise, J.1
-
27
-
-
51349107350
-
Correlating multi-step attack and constructing attack scenarios based on attack pattern modeling
-
Z. Liu, C. Wang, and S. Chen; "Correlating multi-step attack and constructing attack scenarios based on attack pattern modeling," in Proc. Int. Conf. Information Security and Assurance, 2008, pp. 214-219.
-
(2008)
Proc. Int. Conf. Information Security and Assurance
, pp. 214-219
-
-
Liu, Z.1
Wang, C.2
Chen, S.3
-
29
-
-
79952679318
-
China becoming the world's malware factory
-
R. McMillan, "China becoming the world's malware factory," Network World, 2009, http:// www.networkworld.com/news /2009/032409- china-becoming-theworlds-malware.html.
-
(2009)
Network World
-
-
McMillan, R.1
-
32
-
-
4143131906
-
Terrorism or civil disobedience: Toward a hacktivist ethic
-
M. Manion and A. Goodrum, "Terrorism or civil disobedience: Toward a hacktivist ethic," Computers and Society, 2000.
-
(2000)
Computers and Society
-
-
Manion, M.1
Goodrum, A.2
-
33
-
-
79952637881
-
Asian countries looking to bolster cyber defenses
-
J. Miks, "Asian countries looking to bolster cyber defenses," World Politics Rev. Exclusive, 2008, http://www.worldpoliticsreview. com/articlePrint.aspx?ID=2576.
-
(2008)
World Politics Rev. Exclusive
-
-
Miks, J.1
-
35
-
-
38549131427
-
A framework of attacker centric cyber attack behavior analysis
-
DOI 10.1109/ICC.2007.243, 4288914, 2007 IEEE International Conference on Communications, ICC'07
-
X. Peng and H. Zhao, "A framework of attacker centric cyber-attack behavior analysis," in Proc. IEEE Int. Conf. on Communications, 2007, pp. 1449 -1454. (Pubitemid 351145739)
-
(2007)
IEEE International Conference on Communications
, pp. 1449-1454
-
-
Peng, X.1
Zhao, H.2
-
38
-
-
79952647186
-
The invasion of the Chinese cyberspies
-
E. Shannon, "The invasion of the Chinese cyberspies," Time, 2005.
-
(2005)
Time
-
-
Shannon, E.1
-
39
-
-
37249027459
-
IS security, trust and culture: A theoretical framework for managing IS security in multicultural settings
-
J. Slay, "IS security, trust and culture: A theoretical framework for managing IS security in multicultural settings," J. Campus-Wide Information Systems, 2003, vol. 20, no. 3, pp. 98-104.
-
(2003)
J. Campus-Wide Information Systems
, vol.20
, Issue.3
, pp. 98-104
-
-
Slay, J.1
-
40
-
-
33748564401
-
-
Version 1.1, Department of Homeland Security, SEI/CMU
-
S. Redwine, Ed., Secure Software Assurance: A Guide to the Common Body of Knowledge to Produce, Acquire, and Sustain Secure Software, Version 1.1, Department of Homeland Security, SEI/CMU, 2006.
-
(2006)
Secure Software Assurance: A Guide to the Common Body of Knowledge to Produce, Acquire, and Sustain Secure Software
-
-
Redwine, S.1
-
41
-
-
79952680652
-
-
World Health Organization, Centers for Disease Control and Prevention June 11
-
World Health Organization, Centers for Disease Control and Prevention, "Stages of an influenza pandemic," June 11, 2009; https:// www.health.harvard.edu/flu-resource-center/ stages-of-an-influenza-pandemic.htm.
-
(2009)
Stages of an influenza pandemic
-
-
-
43
-
-
79952641412
-
-
Symantec.com
-
Symantec.com, "Symantec's Internet Security Threat Report," vol. XII, 2007, vol. XIII, 2008; http://www.symantec.com/business/ theme.jsp?themeid=threatreport.
-
(2007)
Symantec's Internet Security Threat Report
, vol.12-13
, pp. 2008
-
-
-
44
-
-
79952645759
-
-
Symantec Security Response W95 CIH accessed Feb.
-
Symantec Security Response, W95 CIH," accessed Feb. 2010; http://www.symantec. com/security-response/writeup. jsp?docid=2000-122010-2655- 99.
-
(2010)
-
-
-
46
-
-
84960203883
-
Exchange of 'cyberfire' during the Malaysia-Indonesia Ambalat Dispute: A lesson for the future
-
M. Zubir, "Exchange of 'cyberfire' during the Malaysia-Indonesia Ambalat Dispute: A lesson for the future," Centre for Maritime Security and Diplomacy, MIMA, 2005.
-
(2005)
Centre for Maritime Security and Diplomacy, MIMA
-
-
Zubir, M.1
|