-
2
-
-
84884329269
-
-
Federal Bureau of Investigations September [Accessed 4 September 2012].
-
Federal Bureau of Investigations, DNSChanger Malware, September 2012. [Online]. Available: http://www.fbi.gov. [Accessed 4 September 2012].
-
(2012)
DNSChanger Malware
-
-
-
4
-
-
77956985496
-
-
Tallin, Estonia, November
-
E. Tikk, K. Kaska, K. Runnimeri, M. Kert, A. Taliharm and L. Vihul, Cyber Attacks Against Georgia: Legal Lessons Identified, Tallin, Estonia, November 2008.
-
(2008)
Cyber Attacks Against Georgia: Legal Lessons Identified
-
-
Tikk, E.1
Kaska, K.2
Runnimeri, K.3
Kert, M.4
Taliharm, A.5
Vihul, L.6
-
7
-
-
84866603020
-
China's cyber warfare capabilities
-
Winter
-
D. Ball, China's Cyber Warfare Capabilities, Security Challenges, vol. 7, no. 2, pp. 81-103, Winter 2011.
-
(2011)
Security Challenges
, vol.7
, Issue.2
, pp. 81-103
-
-
Ball, D.1
-
8
-
-
84991730559
-
How russia harnesses cyber war
-
August
-
D. J. Smith, How Russia Harnesses Cyber War, Defense Dossier, vol. 4, pp. 7-11, August 2012.
-
(2012)
Defense Dossier
, vol.4
, pp. 7-11
-
-
Smith, D.J.1
-
9
-
-
85081815529
-
Cyberwar and iranian strategy
-
August
-
I. Berman, Cyberwar and Iranian Strategy, Defense Dossier, vol. 4, pp. 12-15, August 2012.
-
(2012)
Defense Dossier
, vol.4
, pp. 12-15
-
-
Berman, I.1
-
10
-
-
0023294949
-
Computer viruses, theory and experiments
-
F. Cohen, Computer Viruses, Theory and Experiments, Computers and Security, vol. 6, no. 1, 1987.
-
(1987)
Computers and Security
, vol.6
, Issue.1
-
-
Cohen, F.1
-
13
-
-
84866595992
-
A methodology for cyber operations targeting and control of collateral damage in the context of lawful armed conflict
-
Tallinn, Estonia, June
-
R. Fanelli and G. Conti, A Methodology for Cyber Operations Targeting and Control of Collateral Damage in the Context of Lawful Armed Conflict, in International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, June 2012.
-
(2012)
International Conference on Cyber Conflict (CyCon)
-
-
Fanelli, R.1
Conti, G.2
-
14
-
-
85081822616
-
-
Virus:Boot/Stoned [Accessed 1 October
-
Virus:Boot/Stoned, F-Secure, [Online]. Available: http://www.f-secure. com. [Accessed 1 October 2012].
-
(2012)
-
-
-
15
-
-
85081819730
-
-
Jerusalem Accessed 30 September
-
Jerusalem, F-Secure, [Online]. Available: http://www.f-secure.com. [Accessed 30 September 2012].
-
(2012)
-
-
-
16
-
-
85081818637
-
-
Michelangelo (computer virus) [Accessed 12 October 2012].
-
Michelangelo (computer virus), [Online]. Available: http://en.wikipedia. org. [Accessed 12 October 2012].
-
-
-
-
17
-
-
85081816972
-
-
5 June [Accessed 4 August 2012].
-
M. Lee, Flame Used Windows Update to Spread, 5 June 2012. [Online]. Available: http://www.zdnet.com. [Accessed 4 August 2012].
-
(2012)
Flame Used Windows Update to Spread
-
-
Lee, M.1
-
18
-
-
84884311406
-
-
Trend Micro Research Paper, September
-
D. Sancho, J. D. Torre, M. Bakuei, N. Villeneuve and R. McArdle, IXESHE: An APT Campaign, Trend Micro Research Paper, September 2012.
-
(2012)
IXESHE: An APT Campaign
-
-
Sancho, D.1
Torre, J.D.2
Bakuei, M.3
Villeneuve, N.4
McArdle, R.5
-
20
-
-
53349116756
-
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
-
Ann Arbor, MI, June
-
X. Chen, J. Andersen, Z. M. Mao, M. Bailey and J. Nazario, Towards an Understanding of Anti-virtualization and Anti-debugging Behavior in Modern Malware, in IEEE International Conference on Dependable Systems and Networks (DNS), Ann Arbor, MI, June 2008.
-
(2008)
IEEE International Conference on Dependable Systems and Networks (DNS)
-
-
Chen, X.1
Andersen, J.2
Mao, Z.M.3
Bailey, M.4
Nazario, J.5
-
21
-
-
85081820581
-
-
Worm:W32/Mydoom. [Accessed 18 December 2012].
-
Worm:W32/Mydoom, [Online]. Available: http://www.f-secure.com. [Accessed 18 December 2012].
-
-
-
-
22
-
-
85081814513
-
-
Worm:W32/Welchi. [Accessed 30 December 2012].
-
Worm:W32/Welchi, F-Secure, [Online]. Available: http://f-secure.com/. [Accessed 30 December 2012].
-
-
-
-
24
-
-
0141762461
-
Code-Red: A case study on the spread and victims of an Internet Worm
-
Marseille, France, November
-
D. Moore, C. Shannon and J. Brown, Code-Red: a case study on the spread and victims of an Internet Worm, in 2nd ACM SIGCOMM Workshop on Internet Measurement, Marseille, France, November 2002.
-
(2002)
2nd ACM SIGCOMM Workshop on Internet Measurement
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
26
-
-
34547187294
-
-
Carnegie-Mellon University Software Engineering Institute March [Accessed 12 August 2012].
-
Carnegie-Mellon University Software Engineering Institute, CERT Advisory CA-1999-04 Melissa Macro Virus, March 1999. [Online]. Available: http://www.cert.org. [Accessed 12 August 2012].
-
(1999)
CERT Advisory CA-1999-04 Melissa Macro Virus
-
-
-
27
-
-
85081816881
-
-
Virus:W32/Concept [Accessed 12 October
-
Virus:W32/Concept, F-Secure, [Online]. Available: http://f-secure.com. [Accessed 12 October 2012].
-
(2012)
-
-
-
28
-
-
85081819113
-
-
Frodo [Accessed 14 December 2012].
-
Frodo, [Online]. Available: http://virus.wikia.com. [Accessed 14 December 2012].
-
-
-
-
29
-
-
85081816505
-
-
Elk Cloner [Accessed 12 December 2012].
-
Elk Cloner, [Online]. Available: http://virus.wikia.com. [Accessed 12 December 2012].
-
-
-
-
30
-
-
85081814610
-
-
7 Oct. [Accessed 19 December 2012].
-
B. Schneier, Stuxnet, 7 Oct 2007. [Online]. Available: http://www.schneier.com. [Accessed 19 December 2012].
-
(2007)
Stuxnet
-
-
Schneier, B.1
-
32
-
-
0005901311
-
-
IETF May [Accessed 1 December 2012].
-
IETF, RFC 1006-ISO Transport Service on top of the TCP, May 1987. [Online]. Available: http://tools.ietf.org/. [Accessed 1 December 2012].
-
(1987)
RFC 1006-ISO Transport Service on Top of the TCP
-
-
-
33
-
-
85081819928
-
-
Kaspersky Labs 14 August [Accessed 20 Dec. 2012].
-
Kaspersky Labs, The Mystery of the Encrypted Gauss Payload, 14 August 2012. [Online]. Available: http://www.securelist.com. [Accessed 20 Dec. 2012].
-
(2012)
The Mystery of the Encrypted Gauss Payload
-
-
|