-
1
-
-
84892381669
-
-
Fisher, D.:Threatpost. [Online] 15June2012 [Cited: 0102 2013] https://threatpost.com/en-us/blogs/what-have-we-learned-flame-malware-061512
-
Threatpost
-
-
Fisher, D.1
-
2
-
-
84892392920
-
-
January
-
Lemos, R.: Infoworld. [Online] 19 January 2011 [Cited: 02 02 2013] http://www.infoworld.com/t/malware/stuxnet-attack-more-effective-bombs-888
-
(2011)
Infoworld
-
-
Lemos, R.1
-
3
-
-
84900602050
-
-
14January 2013 [Cited: 12 02
-
Schwartz, M.: Information week. [Online] 14January 2013 [Cited: 12 02 2013] http://www.informationweek.com/security/attacks/red-october-espionage- network-rivals-fla/24014621B
-
(2013)
Information Week
-
-
Schwartz, M.1
-
4
-
-
79953895474
-
Lessons from Stuxnet
-
April, DOI=10.1109/MC.2011.11B
-
Chen, T., Abu-Nimeh, S.: Lessons from Stuxnet. In: Computer, Vol. 44, No. 4, pp. 91-93, April 2011 DOI=10.1109/MC.2011.11B http://dx.doi.org/10.1109/MC. 2011.11B
-
(2011)
Computer
, vol.44
, Issue.4
, pp. 91-93
-
-
Chen, T.1
Abu-Nimeh, S.2
-
5
-
-
84922491429
-
An insidelookatstuxnet
-
Larimer, J.: An insidelookatStuxnet. IBM, 2010.
-
(2010)
IBM
-
-
Larimer, J.1
-
6
-
-
84873617895
-
Duqu: Analysis, detection, and lessons learned
-
Bencsath, B., Pek, C., Buttyan, L., Felegyhazi, M.: Duqu: Analysis, detection, and lessons learned. In: Proc. ofACM Eu?ropean Workshop on System Security (EuroSec-2012), 2012.
-
(2012)
Proc. OfACM European Workshop on System Security EuroSec-2012
-
-
Bencsath, B.1
Pek, C.2
Buttyan, L.3
Felegyhazi, M.4
-
7
-
-
84894191142
-
The cousins of stuxnet: Duqu, flame, and causs
-
Bencsath, B., Pek, C., Buttyan, L., Felegyhazi, M.: The Cousins of Stuxnet: Duqu, Flame, and Causs. In: Future Internet, Vol. 4, No. 4, pp. 971-1003, 2012.
-
(2012)
Future Internet
, vol.4
, Issue.4
, pp. 971-1003
-
-
Bencsath, B.1
Pek, C.2
Buttyan, L.3
Felegyhazi, M.4
-
8
-
-
84892420573
-
-
14January 2013 [Cited: 1B 01
-
Kaspersky Labs. "Red October" DiplomaticCyberAttacksInvestigation. [Online] 14January 2013 [Cited: 1B 01 2013] http://www.securelist.com/en/analysis/204792262/Red-October-Diplomatic-Cyber- Attacks-Investigation
-
(2013)
Red October"Diplomaticcyberattacksinvestigation
-
-
Labs, K.1
-
10
-
-
79957616447
-
Stuxnet: Dissecting a cyberwarfare weapon
-
May-June
-
Langner, R.: Stuxnet: Dissecting a Cyberwarfare Weapon. In: IEEE Security & Privacy, Vol. 9, No. 3, pp. 49-B1, May-June 2011.
-
(2011)
IEEE Security &Privacy
, vol.9
, Issue.3
-
-
Langner, R.1
-
14
-
-
84892413738
-
-
[Cited: 1102 2013.]
-
Microsoft: [Online] [Cited: 1102 2013.] http://office.microsoft.com/en- 001/excel-help/what-is-protected-view-HA0103BB931.aspx.
-
-
-
-
16
-
-
84892406090
-
Intrusion detection: Evaluation and performance issues of the securenet system
-
October
-
Denault, M., 6ritzalis, D., Karagiannis, D., Spirakis, P.: Intrusion detection: Evaluation and performance issues of the SECURENET system. In: Computers&Security, Vol. 13, No. 6, pp. 49B-B08, October 1994.
-
(1994)
Computers&Security
, vol.13
, Issue.6
-
-
Denault, M.1
Critzalis, D.2
Karagiannis, D.3
Spirakis, P.4
-
17
-
-
84892394786
-
Design of a neural network for recognition and classification of computer viruses
-
October
-
Doumas, A., Mavroudakis, K., Critzalis, D., Katsikas, S.: Design of a neural network for recognition and classification of computer viruses. In: Computers& Security, Vol. 14, No. B, pp. 43B-448, October 199B.
-
(1991)
Computers&Security
, vol.14
-
-
Doumas, A.1
Mavroudakis, K.2
Critzalis, D.3
Katsikas, S.4
-
18
-
-
23444459747
-
Secure electronic voting: The current landscape
-
Critzalis D. (Ed.)Kluwer Academic Publishers, USA
-
Lambrinoudakis, C., Critzalis, D., Tsoumas, V., Karyda, M., Ikonomopoulos, S.: Secure electronic voting: The current landscape. In: Secure Electronic Voting, critzalis D. (Ed.), pp. 101-122, Kluwer Academic Publishers, USA, 2003.
-
(2003)
Secure Electronic Voting
, pp. 101-122
-
-
Lambrinoudakis, C.1
Critzalis, D.2
Tsoumas, V.3
Karyda, M.4
Ikonomopoulos, S.5
-
19
-
-
33947651649
-
Long-term verifiability of healthcare records authenticity
-
Lekkas, D., Critzalis, D.: Long-term verifiability of healthcare records authenticity. In: InternationalJournal ofMedical Informatics, Vol. 76, Issue B-6, pp. 442-448, 2006.
-
(2006)
International Journal Of Medical Informatics
, vol.76
, Issue.6
, pp. 442-448
-
-
Lekkas, D.1
Critzalis, D.2
-
20
-
-
0034446783
-
Evaluating certificate status information mechanisms
-
ACM Press, USA
-
Iliadis, J., 6ritzalis, D., Spinellis, D., Preneel, B., Katsikas, S.: Evaluating certificate status information mechanisms. In: Proc. ofthe 7th ACM Computer& CommunicationsSecurity Conference (CCS-2000), pp. 1-9, ACM Press, USA, 2000.
-
(2000)
Proc. Ofthe 7th ACM Computer&CommunicationsSecurity Conference (CCS-2000)
, pp. 1-9
-
-
Iliadis, J.1
Critzalis, D.2
Spinellis, D.3
Preneel, B.4
Katsikas, S.5
|