메뉴 건너뛰기




Volumn , Issue , 2013, Pages

A control measure framework to limit collateral damage and propagation of cyber weapons

Author keywords

collateral damage; cyber operations; law of armed conflict; malware controls

Indexed keywords

COMPUTER CRIME; DAMAGE DETECTION;

EID: 84904396614     PISSN: 23255366     EISSN: 23255374     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (14)

References (33)
  • 2
    • 84884329269 scopus 로고    scopus 로고
    • Federal Bureau of Investigations September [Accessed 4 September 2012].
    • Federal Bureau of Investigations, DNSChanger Malware, September 2012. [Online]. Available: http://www.fbi.gov. [Accessed 4 September 2012].
    • (2012) DNSChanger Malware
  • 7
    • 84866603020 scopus 로고    scopus 로고
    • China's cyber warfare capabilities
    • Winter
    • D. Ball, China's Cyber Warfare Capabilities, Security Challenges, vol. 7, no. 2, pp. 81-103, Winter 2011.
    • (2011) Security Challenges , vol.7 , Issue.2 , pp. 81-103
    • Ball, D.1
  • 8
    • 84991730559 scopus 로고    scopus 로고
    • How russia harnesses cyber war
    • August
    • D. J. Smith, How Russia Harnesses Cyber War, Defense Dossier, vol. 4, pp. 7-11, August 2012.
    • (2012) Defense Dossier , vol.4 , pp. 7-11
    • Smith, D.J.1
  • 9
    • 85081815529 scopus 로고    scopus 로고
    • Cyberwar and iranian strategy
    • August
    • I. Berman, Cyberwar and Iranian Strategy, Defense Dossier, vol. 4, pp. 12-15, August 2012.
    • (2012) Defense Dossier , vol.4 , pp. 12-15
    • Berman, I.1
  • 10
    • 0023294949 scopus 로고
    • Computer viruses, theory and experiments
    • F. Cohen, Computer Viruses, Theory and Experiments, Computers and Security, vol. 6, no. 1, 1987.
    • (1987) Computers and Security , vol.6 , Issue.1
    • Cohen, F.1
  • 13
    • 84866595992 scopus 로고    scopus 로고
    • A methodology for cyber operations targeting and control of collateral damage in the context of lawful armed conflict
    • Tallinn, Estonia, June
    • R. Fanelli and G. Conti, A Methodology for Cyber Operations Targeting and Control of Collateral Damage in the Context of Lawful Armed Conflict, in International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, June 2012.
    • (2012) International Conference on Cyber Conflict (CyCon)
    • Fanelli, R.1    Conti, G.2
  • 14
    • 85081822616 scopus 로고    scopus 로고
    • Virus:Boot/Stoned [Accessed 1 October
    • Virus:Boot/Stoned, F-Secure, [Online]. Available: http://www.f-secure. com. [Accessed 1 October 2012].
    • (2012)
  • 15
    • 85081819730 scopus 로고    scopus 로고
    • Jerusalem Accessed 30 September
    • Jerusalem, F-Secure, [Online]. Available: http://www.f-secure.com. [Accessed 30 September 2012].
    • (2012)
  • 16
    • 85081818637 scopus 로고    scopus 로고
    • Michelangelo (computer virus) [Accessed 12 October 2012].
    • Michelangelo (computer virus), [Online]. Available: http://en.wikipedia. org. [Accessed 12 October 2012].
  • 17
    • 85081816972 scopus 로고    scopus 로고
    • 5 June [Accessed 4 August 2012].
    • M. Lee, Flame Used Windows Update to Spread, 5 June 2012. [Online]. Available: http://www.zdnet.com. [Accessed 4 August 2012].
    • (2012) Flame Used Windows Update to Spread
    • Lee, M.1
  • 21
    • 85081820581 scopus 로고    scopus 로고
    • Worm:W32/Mydoom. [Accessed 18 December 2012].
    • Worm:W32/Mydoom, [Online]. Available: http://www.f-secure.com. [Accessed 18 December 2012].
  • 22
    • 85081814513 scopus 로고    scopus 로고
    • Worm:W32/Welchi. [Accessed 30 December 2012].
    • Worm:W32/Welchi, F-Secure, [Online]. Available: http://f-secure.com/. [Accessed 30 December 2012].
  • 24
  • 26
    • 34547187294 scopus 로고    scopus 로고
    • Carnegie-Mellon University Software Engineering Institute March [Accessed 12 August 2012].
    • Carnegie-Mellon University Software Engineering Institute, CERT Advisory CA-1999-04 Melissa Macro Virus, March 1999. [Online]. Available: http://www.cert.org. [Accessed 12 August 2012].
    • (1999) CERT Advisory CA-1999-04 Melissa Macro Virus
  • 27
    • 85081816881 scopus 로고    scopus 로고
    • Virus:W32/Concept [Accessed 12 October
    • Virus:W32/Concept, F-Secure, [Online]. Available: http://f-secure.com. [Accessed 12 October 2012].
    • (2012)
  • 28
    • 85081819113 scopus 로고    scopus 로고
    • Frodo [Accessed 14 December 2012].
    • Frodo, [Online]. Available: http://virus.wikia.com. [Accessed 14 December 2012].
  • 29
    • 85081816505 scopus 로고    scopus 로고
    • Elk Cloner [Accessed 12 December 2012].
    • Elk Cloner, [Online]. Available: http://virus.wikia.com. [Accessed 12 December 2012].
  • 30
    • 85081814610 scopus 로고    scopus 로고
    • 7 Oct. [Accessed 19 December 2012].
    • B. Schneier, Stuxnet, 7 Oct 2007. [Online]. Available: http://www.schneier.com. [Accessed 19 December 2012].
    • (2007) Stuxnet
    • Schneier, B.1
  • 32
  • 33
    • 85081819928 scopus 로고    scopus 로고
    • Kaspersky Labs 14 August [Accessed 20 Dec. 2012].
    • Kaspersky Labs, The Mystery of the Encrypted Gauss Payload, 14 August 2012. [Online]. Available: http://www.securelist.com. [Accessed 20 Dec. 2012].
    • (2012) The Mystery of the Encrypted Gauss Payload


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.