-
1
-
-
85163465076
-
-
Adobe. APSA09-01: Security Updates available for Adobe Reader and Acrobat versions 9 and earlier, February, URL
-
Adobe. APSA09-01: Security Updates available for Adobe Reader and Acrobat versions 9 and earlier, February 2009. URL http://www.adobe.com/support/security/advisories/apsa09-01.html.
-
(2009)
-
-
-
2
-
-
75149188648
-
Building A System For Insider Security
-
doi: 10.1109/MSP.2009.111
-
Duran F, Conrad, S. H, Conrad, G. N, Duggan, D. P and Held E. B. Building A System For Insider Security. IEEE Security & Privacy, 7(6):30-38, 2009. doi: 10.1109/MSP.2009.111.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.6
, pp. 30-38
-
-
Duran, F.1
Conrad, S.H.2
Conrad, G.N.3
Duggan, D.P.4
Held, E.B.5
-
3
-
-
84882204548
-
Network Security Breaches Plague NASA
-
November 2008. URL
-
Epstein, Keith, and Elgin, Ben. Network Security Breaches Plague NASA, November 2008. URL http://www.businessweek.com/print/magazine/content/0_48/b4110072404167.htm.
-
-
-
Epstein, K.1
Elgin, B.2
-
4
-
-
84893150145
-
Defending Against the Unknown: Antiterrorism and the Terrorist Planning Cycle
-
LTC Ashton Hayes
-
LTC Ashton Hayes. Defending Against the Unknown: Antiterrorism and the Terrorist Planning Cycle. The Guardian, 10(1):32-36, 2008. URL http://www.jcs.mil/content/files/2009-04/04130915524_ spring2008.pdf.
-
The Guardian
, vol.10
, Issue.1
-
-
-
5
-
-
78650900359
-
Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation
-
October, URL
-
Krekel, Bryan. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation, October 2009. URL http://www.uscc.gov/researchpapers/2009/NorthropGrumma_ PR_Cybe_Pape_FINA_Approved%20Repor_16Oct2009.pdf.
-
(2009)
-
-
Krekel, B.1
-
6
-
-
85163516419
-
Andrew Holistic Approaches to Cybersecurity to Enable Network Centric Operations
-
April, URL
-
Lewis, James Andrew Holistic Approaches to Cybersecurity to Enable Network Centric Operations, April 2008. URL http://armedservices.house.gov/pdfs/TUTC040108/Lewi_Testimony040108.pdf.
-
(2008)
-
-
Lewis, J.1
-
7
-
-
84855831640
-
M-Trends: The Advanced Persistent Threat
-
Mandiant, January, URL
-
Mandiant. M-Trends: The Advanced Persistent Threat, January 2010. URL http://www.mandiant.com/products/services/m-trends.
-
(2010)
-
-
-
8
-
-
85163480096
-
-
Microsoft. Microsoft Security Bulletin MS09-017: Vulnerabilities in Microsoft Office PowerPoint Could Allow Remote Code Execution (967340), May, URL
-
Microsoft. Microsoft Security Bulletin MS09-017: Vulnerabilities in Microsoft Office PowerPoint Could Allow Remote Code Execution (967340), May 2009a. URL http://www.microsoft.com/technet/security/bulletin/ms09-017.mspx.
-
(2009)
-
-
-
9
-
-
85163463227
-
-
Microsoft. Microsoft Security Advisory (969136): Vulnerability in Microsoft Office PowerPoint Could Allow Remote Code Execution, April, URL
-
Microsoft. Microsoft Security Advisory (969136): Vulnerability in Microsoft Office PowerPoint Could Allow Remote Code Execution, April 2009b. URL http://www.microsoft.com/technet/security/advisory/969136.mspx.
-
(2009)
-
-
-
10
-
-
33746748784
-
Dimitrios Patsosa, and Christos Douligeris
-
Sarandis Mitropoulos, July, URL
-
Sarandis Mitropoulos, Dimitrios Patsosa, and Christos Douligeris. On Incident Handling and Response: A stateof- the-art approach. Computers & Security, 5:351-370, July 2006. URL http://dx.doi.org/10.1016/j.cose.2005.09.006.
-
(2006)
On Incident Handling and Response: A stateof- the-art approach. Computers & Security
, vol.5
, pp. 351-370
-
-
-
11
-
-
85163492928
-
Special Publication
-
National Institute of Standards and Technology, Computer Security Incident Handling Guide, March
-
National Institute of Standards and Technology. Special Publication 800-61: Computer Security Incident Handling Guide, March 2008. URL http://csrc.nist.gov/publications/PubsSPs.html.
-
(2008)
, pp. 800-861
-
-
-
12
-
-
70350525184
-
Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities
-
National Research Council., (Abbreviated Version
-
National Research Council. Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities (Abbreviated Version), 2007. URL http://books.nap.edu/catalog.php?recor_id=11953.
-
(2007)
-
-
-
13
-
-
51349142613
-
Exploring Security Countermeasures along the Attack Sequence
-
In Proc. Int. Conf. Information Security and Assurance ISA 2008, doi:10.1109/ISA.2008.112
-
Sakuraba, T. Domyo, S, Chou Bin-Hui and Sakurai, K. Exploring Security Countermeasures along the Attack Sequence. In Proc. Int. Conf. Information Security and Assurance ISA 2008, pages 427-432, 2008. doi:10.1109/ISA.2008.112.
-
(2008)
, pp. 427-432
-
-
Sakuraba, T.1
Domyo, S.2
Chou Bin-Hui3
Sakurai, K.4
-
14
-
-
85163511696
-
Aurora
-
Response Recommendations, February 2010. URL
-
Stamos, Alex. "Aurora" Response Recommendations, February 2010. URL https://www.isecpartners./com/files/iSE_Auror_Respons_Recommendations.pdf.
-
-
-
Stamos, A.1
-
15
-
-
0034425955
-
Find, Fix, Track, Target, Engage, Assess
-
URL
-
Tirpak, John A. Find, Fix, Track, Target, Engage, Assess. Air Force Magazine, 83:24-29, 2000. URL http://www.airforce-magazine.com/MagazineArchive/Pages/2000/July%202000/0700find.aspx.
-
(2000)
Air Force Magazine
, vol.83
, pp. 24-29
-
-
Tirpak, J.A.1
-
16
-
-
85163424674
-
National Infrastructure Security Co-ordination Centre: Targeted Trojan Email Attacks
-
UK-NISCC., June, URL
-
UK-NISCC. National Infrastructure Security Co-ordination Centre: Targeted Trojan Email Attacks, June 2005. URL https://www.cpni.gov.uk/docs/ttea.pdf.
-
(2005)
-
-
-
17
-
-
84863536999
-
A Military Guide to Terrorism in the Twenty-First Century
-
United States Army Training and Doctrine Command., August, URL
-
United States Army Training and Doctrine Command. A Military Guide to Terrorism in the Twenty-First Century, August 2007. URL http://www.dtic.mil/srch/doc?collection=t3&id=ADA472623.
-
(2007)
-
-
-
18
-
-
85163555515
-
-
US-CERT., Technical Cyber Security Alert TA05-189A: Targeted Trojan Email Attacks, July
-
US-CERT. Technical Cyber Security Alert TA05-189A: Targeted Trojan Email Attacks, July 2005. URL http://www.us-cert.gov/cas/techalerts/TA05-189A.html.
-
(2005)
-
-
-
19
-
-
85163420446
-
-
U.S.-China Economic and Security Review Commission. 2008 Report to Congress of the U.S. China Economic and Security Review Commission, November, URL
-
U.S.-China Economic and Security Review Commission. 2008 Report to Congress of the U.S. China Economic and Security Review Commission, November 2008. URL http://www.uscc.gov/annua_report/2008/annua_repor_ful_08.pdf.
-
(2008)
-
-
-
20
-
-
85163474375
-
-
U.S.-China Economic and Security Review Commission. 2009 Report to Congress of the U.S.-China Economic and Security Review Commission, November, URL
-
U.S.-China Economic and Security Review Commission. 2009 Report to Congress of the U.S.-China Economic and Security Review Commission, November 2009. URL http://www.uscc.gov/annua_report/2009/annua_repor_ful_09.pdf.
-
(2009)
-
-
-
21
-
-
85163489582
-
-
U.S. Department of Defense. Joint Publication 3-13 Information Operations, February
-
U.S. Department of Defense. Joint Publication 3-13 Information Operations, February 2006. URL http://www.dtic.mil/doctrine/ne_pubs/jp_13.pdf.
-
(2006)
-
-
-
22
-
-
85163494888
-
-
U.S. Department of Defense. Joint Publication 3-60 Joint Targeting, April
-
U.S. Department of Defense. Joint Publication 3-60 Joint Targeting, April 2007. URL http://www.dtic.mil/doctrine/ne_pubs/jp_60.pdf.
-
(2007)
-
-
-
23
-
-
70149119150
-
Mikko Overcoming the insider: reducing employee computer crime through Situational Crime Prevention
-
Willison, Robert and Siponen. Mikko Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. Communications of the ACM, 52(9):133-137, 2009. doi: http://doi.acm. org/10.1145/1562164.1562198.
-
(2009)
Communications of the ACM
, vol.52
, Issue.9
, pp. 133-137
-
-
Willison, R.1
Siponen2
|