-
1
-
-
84894138122
-
-
Fisher, D.: Threatpost. [Online] 15 June 2012 [Cited: 01 02 2013]
-
Fisher, D.: Threatpost. [Online] 15 June 2012 [Cited: 01 02 2013] https://threatpost.com/en-us/blogs/what-have-welearned-flame-malware-061512
-
-
-
-
2
-
-
79953895474
-
-
(April 2011)
-
Chen, T., Abu-Nimeh, S.: 2011. Lessons from Stuxnet. Computer 44, 4 (April 2011), 91-93. http://dx.doi.org/10.1109/MC.2011.115
-
(2011)
Lessons from Stuxnet. Computer
, vol.44
, Issue.4
, pp. 91-91
-
-
Chen, T.1
Abu-Nimeh, S.2
-
4
-
-
78650062267
-
-
Symantec, February
-
Falliere, N., Murchu, L., Chien, E., W32.Stuxnet Dossier, Symantec, February 2011.
-
(2011)
W32.Stuxnet Dossier
-
-
Falliere, N.1
Murchu, L.2
Chien, E.3
-
5
-
-
79960349207
-
-
ESET
-
Matrosov, A., Rodionov, E., Harley, D., Malcho, J., Stuxnet Under the Microscope, ESET, 2011.
-
(2011)
Stuxnet under the Microscope
-
-
Matrosov, A.1
Rodionov, E.2
Harley, D.3
Malcho, J.4
-
6
-
-
84894214552
-
-
Symantec, W32.Duqu-The precursor to the next Stuxnet, Symantec, 2011
-
Symantec, W32.Duqu-The precursor to the next Stuxnet, Symantec, 2011.
-
-
-
-
7
-
-
84873617895
-
Duqu: Analysis, detection, and lessons learned
-
Bencsath, B., Pek, G., Buttyan, L., Felegyhazi, M., "Duqu: Analysis, detection, and lessons learned", in Proc. of the 2nd ACM European Workshop on System Security, 2012.
-
(2012)
Proc. of the 2nd ACM European Workshop on System Security
-
-
Bencsath, B.1
Pek, G.2
Buttyan, L.3
Felegyhazi, M.4
-
8
-
-
84894191142
-
The cousins of stuxnet: Duqu, flame, and gauss
-
Bencsath, B., Pek G., Buttyan L., Felegyhazi M., "The Cousins of Stuxnet: Duqu, Flame, and Gauss", in Proc. of Future Internet, 2012.
-
(2012)
Proc. of Future Internet
-
-
Bencsath, B.1
Pek, G.2
Buttyan, L.3
Felegyhazi, M.4
-
9
-
-
84894129976
-
-
Kaspersky Labs. [Online] 28 May 2012 [Cited: 01 January 2013
-
Kaspersky Labs. [Online] 28 May 2012 [Cited: 01 January 2013] http://www.securelist.com/en/blog?weblogid=208193522
-
-
-
-
10
-
-
84894144461
-
-
Kaspersky Labs Red October" Diplomatic Cyber Attacks Investigation. [Online] 14 01 2013 [Cited: 15 01 2013]
-
Kaspersky Labs. "Red October" Diplomatic Cyber Attacks Investigation. [Online] 14 01 2013 [Cited: 15 01 2013] http://www.securelist. com/en/analysis/204792262/Red-Octo ber-Diplomatic-Cyber-Attacks-Investigation
-
-
-
-
11
-
-
84894223862
-
-
Tivadar, M., Balazs, B., Istrate, C., A closer look at Miniduke. [Online] [Cited: 20 05 2013]
-
Tivadar, M., Balazs, B., Istrate, C., A closer look at Miniduke. [Online] [Cited: 20 05 2013] http://labs. bitdefend-er.com/wp-content/uploads/downloads/ 2013/04/ MiniDuke- Paper-Final.pdf
-
-
-
-
12
-
-
85029355386
-
-
Raiu, C., Soumenkov, I., Baumgartner, K., Kamluk V., "The MiniDuke Mystery" [Online] [Cited: 10 05 2013] https://www.securelist.com/en/ downloads/vlpdfs/themystery ofthepdf0-dayassemblermicrobackdoor.pdf
-
The MiniDuke Mystery
-
-
Raiu, C.1
Soumenkov, I.2
Baumgartner, K.3
Kamluk, V.4
-
13
-
-
84868088467
-
-
SANS Institute. Online] 2011 [Cited: 21 12
-
Binde, E., McRee, R., O'Connor, T., "Assessing Outbound Traffic to Uncover Advanced Persistent Threat", SANS Institute. Online] 2011 [Cited: 21 12 2012] http://www.sans.edu/ student-files/projects/JWP-Binde-McRee-OConnor. pdf
-
(2012)
Assessing Outbound Traffic to Uncover Advanced Persistent Threat
-
-
Binde, E.1
McRee, R.2
O'Connor, T.3
-
14
-
-
84892403835
-
The big four-What we did wrong in protecting critical ict infrastructures from advanced persistent threat detection
-
IEEE
-
Virvilis N., Gritzalis D., "The Big Four-What we did wrong in protecting critical ICT infrastructures from Advanced Persistent Threat detection?", in Proc. of the 8th International Conference on Availability, Reliability &Security, pp. 248-254, IEEE, 2013.
-
(2013)
Proc. of the 8th International Conference on Availability, Reliability &Security
, pp. 248-254
-
-
Virvilis, N.1
Gritzalis, D.2
-
16
-
-
38049026664
-
-
Web Page
-
Kuhlmann, D., Landfermann, R., Ramasamy, H., Schunter, M., Ramunno, G., Vernizzi, D., "An open trusted computing architecture-Secure virtual machines enabling user-defined policy enforcement", Web Page: http://www. opentc.net/acti vities/otc-HighLevelOverview/OTC, 2006.
-
(2006)
An Open Trusted Computing Architecture-Secure Virtual Machines Enabling User-defined Policy Enforcement
-
-
Kuhlmann, D.1
Landfermann, R.2
Ramasamy, H.3
Schunter, M.4
Ramunno, G.5
Vernizzi, D.6
-
17
-
-
34547194202
-
Manitou: A layer-below approach to fighting malware
-
ACM
-
Litty, L., Lie, D., "Manitou: a layer-below approach to fighting malware", in Proc. of the 1st Workshop on architectural and system support for improving software dependability, pp. 6-11, ACM, 2006.
-
(2006)
Proc. of the 1st Workshop on Architectural and System Support for Improving Software Dependability
, pp. 6-11
-
-
Litty, L.1
Lie, D.2
-
18
-
-
17444421583
-
Does trusted computing remedy computer security problems
-
Oppliger, R., Rytz, R., "Does trusted computing remedy computer security problems?", Security &Privacy, IEEE, 3(2), 16-19, 2005.
-
(2005)
Security &Privacy, IEEE
, vol.3
, Issue.2
, pp. 16-19
-
-
Oppliger, R.1
Rytz, R.2
-
19
-
-
80052493767
-
Smartphone security evaluation: The malware attack case
-
SciTekPress
-
Mylonas, A., Tsoumas, B., Dritsas, S., Gritzalis, D., "Smartphone security evaluation: The malware attack case", in Proc. of the 8th International Conference on Security and Cryptography, pp. 25-36, SciTekPress, 2011.
-
(2011)
Proc. of the 8th International Conference on Security and Cryptography
, pp. 25-36
-
-
Mylonas, A.1
Tsoumas, B.2
Dritsas, S.3
Gritzalis, D.4
-
20
-
-
84882242289
-
On the feasibility of malware attacks in smartphone platforms
-
Springer (CCIS-314)
-
Mylonas, A., Dritsas, S., Tsoumas, B., Gritzalis, D., "On the feasibility of malware attacks in smartphone platforms", Security and Cryptography, pp. 217-232, Springer (CCIS-314), 2012.
-
(2012)
Security and Cryptography
, pp. 217-232
-
-
Mylonas, A.1
Dritsas, S.2
Tsoumas, B.3
Gritzalis, D.4
-
21
-
-
1642275386
-
Embedding privacy in it applications development
-
Gritzalis, D., "Embedding privacy in IT applications development", Information Management &Computer Security, vol. 12, no. 1, pp. 8-26, 2004.
-
(2004)
Information Management &Computer Security
, vol.12
, Issue.1
, pp. 8-26
-
-
Gritzalis, D.1
-
22
-
-
84894131690
-
-
Lemos, R., Infoworld. [Online] 19 January 2011 [Cited: 02 February 2013]
-
Lemos, R., Infoworld. [Online] 19 January 2011 [Cited: 02 February 2013] http://www.infoworld.com/t/malware/stux net-attack-more-effective-bombs-888
-
-
-
-
23
-
-
84894134938
-
-
Symantec, Stuxnet 0.5: The missing link, Symantec, 2013
-
Symantec, Stuxnet 0.5: The missing link, Symantec, 2013.
-
-
-
-
24
-
-
84894133523
-
-
Kaspersky Labs. [Online] 11 June 2012. [Cited: 3 February 2013.]
-
Kaspersky Labs. [Online] 11 June 2012. [Cited: 3 February 2013.] http://www.kaspersky.com/about/news/virus/2012/Re source-207-Kaspersky-Lab- Research-Proves-that- Stuxnet -and-Flame-Developers-are-Connected
-
-
-
-
25
-
-
84894219959
-
-
Field, S., An introduction to kernel patch protection. [Online] 12 August 2006. [Cited: 08 February 2013.]
-
Field, S., An introduction to kernel patch protection. [Online] 12 August 2006. [Cited: 08 February 2013.] http://blogs.msdn.com/b
-
-
-
-
26
-
-
84894107723
-
-
Microsoft: [Online] [Cited: 11 02 2013.]
-
Microsoft: [Online] [Cited: 11 02 2013.] http://office.microsoft.com/en- 001/excel-help/what-isprotected-view-HA010355931.aspx.
-
-
-
-
27
-
-
84894159056
-
-
Schneier, B., www.schneier.com. [Online] 19 June 2012. [Cited: 6 February 2013.]
-
Schneier, B., www.schneier.com. [Online] 19 June 2012. [Cited: 6 February 2013.] http://www.schneier.com /blog/archives/2012/06/the-failure-of-3.html.
-
-
-
-
29
-
-
0028742960
-
Intrusion detection: Evaluation and performance issues of the securenet system
-
Denault, M., Gritzalis, D., Karagiannis, D., Spirakis, P., "Intrusion detection: Evaluation and performance issues of the SECURENET system", Computers &Security, vol. 13, no. 6, pp. 495-508, 1994.
-
(1994)
Computers &Security
, vol.13
, Issue.6
, pp. 495-508
-
-
Denault, M.1
Gritzalis, D.2
Karagiannis, D.3
Spirakis, P.4
-
30
-
-
84894176862
-
Diode réseau et exefilter: 2 projects pour des interconnexions sécurisées
-
Lagadec P., "Diode réseau et ExeFilter: 2 projects pour des interconnexions sécurisées", in Proc. of SSTIC06, pp. 1-15, 2006.
-
(2006)
Proc. of SSTIC06
, pp. 1-15
-
-
Lagadec, P.1
-
31
-
-
84894180876
-
-
Alexa Top Sites
-
Alexa Top Sites-http://www.alexa.com/topsites
-
-
-
-
32
-
-
0029483547
-
Design of a neural network for recognition and classification of computer viruses
-
October
-
Doumas, A., Mavroudakis, K., Gritzalis, D., Katsikas, S., "Design of a neural network for recognition and classification of computer viruses", Computers &Security, vol. 14, no. 5, pp. 435-448, October 1995.
-
(1995)
Computers &Security
, vol.14
, Issue.5
, pp. 435-448
-
-
Doumas, A.1
Mavroudakis, K.2
Gritzalis, D.3
Katsikas, S.4
-
33
-
-
84860394158
-
Enhancing security and improving interoperability in healthcare information systems
-
Gritzalis, D., "Enhancing security and improving interoperability in healthcare information systems", Informatics for Health and Social Care, vol. 23, no. 4, pp. 309-324, 1998.
-
(1998)
Informatics for Health and Social Care
, vol.23
, Issue.4
, pp. 309-324
-
-
Gritzalis, D.1
-
34
-
-
78049354490
-
An insider threat prediction model
-
Springer (LNCS), 2010.
-
Kandias, M., Mylonas, A., Virvilis, N., Theoharidou, M., Gritzalis, D., "An Insider Threat Prediction Model", in Proc. of the 7th International Conference on Trust, Privacy, and Security in Digital Business, pp. 26-37, Springer (LNCS 6264), 2010.
-
(6264)
Proc. of the 7th International Conference on Trust, Privacy, and Security in Digital Business
, pp. 26-37
-
-
Kandias, M.1
Mylonas, A.2
Virvilis, N.3
Theoharidou, M.4
Gritzalis, D.5
-
35
-
-
0030073977
-
Model for network behaviour under viral attack
-
Katsikas, S., Spyrou, T., Gritzalis, D., Darzentas, J., "Model for network behaviour under viral attack", Computer Communications, vol. 19, no. 2, pp. 124-132, 1996.
-
(1996)
Computer Communications
, vol.19
, Issue.2
, pp. 124-132
-
-
Katsikas, S.1
Spyrou, T.2
Gritzalis, D.3
Darzentas, J.4
-
36
-
-
0007685267
-
Attack modeling in open network environments
-
Chapman &Hall
-
Katsikas, S., Gritzalis, D., Spirakis, P., "Attack Modeling in Open Network Environments", in Proc. of the 2nd Communications and Multimedia Security Conference, pp. 268-277, Chapman &Hall, 1997.
-
(1997)
Proc. of the 2nd Communications and Multimedia Security Conference
, pp. 268-277
-
-
Katsikas, S.1
Gritzalis, D.2
Spirakis, P.3
|