-
5
-
-
85175131682
-
-
Proceedings of ASIACCS 11, 22-24 March, Hong Kong, China
-
Cárdenas, A.A., Amin, S., Lin, Z.S., Huang, Y.L., Huang, C.Y. and Sastry, S. (2011) Attacks Against Process Control Systems: Risk Assessment, Detection, and Response. Proceedings of ASIACCS 11, 22-24 March, Hong Kong, China, pp. 335-366.
-
(2011)
Attacks Against Process Control Systems: Risk Assessment, Detection, and Response
, pp. 335-366
-
-
Cárdenas, A.A.1
Amin, S.2
Lin, Z.S.3
Huang, Y.L.4
Huang, C.Y.5
Sastry, S.6
-
7
-
-
79952564806
-
High tech criminal threats to the national information infrastructure
-
Choo, K.K.R. (2010) High tech criminal threats to the national information infrastructure. Information Security Technical Report 15(3): 104-111.
-
(2010)
Information Security Technical Report
, vol.15
, Issue.3
, pp. 104-111
-
-
Choo, K.K.R.1
-
8
-
-
80955142795
-
The cyber threat landscape: Challenges and future research directions
-
Choo, K.K.R. (2011) The cyber threat landscape: Challenges and future research directions. Computers & Security 30(8): 719-731.
-
(2011)
Computers & Security
, vol.30
, Issue.8
, pp. 719-731
-
-
Choo, K.K.R.1
-
13
-
-
15744391114
-
-
January
-
Grance, T., Kent, K. and Kim, B. (2004) NIST SP800-61-Computer Security Incident Handling Guide, NIST, January.
-
(2004)
NIST SP800-61-Computer Security Incident Handling Guide, NIST
-
-
Grance, T.1
Kent, K.2
Kim, B.3
-
15
-
-
36448941716
-
-
Kent, K., Chevalier, S., Grance, T. and Dang, H. (2006) NIST SP800-86-Guide to Integrating Forensic Techniques into Incident Response, NIST, August.
-
(2006)
NIST SP800-86-Guide to Integrating Forensic Techniques into Incident Response, NIST, August
-
-
Kent, K.1
Chevalier, S.2
Grance, T.3
Dang, H.4
-
17
-
-
80955159158
-
-
New York Times 19 November, accessed 17 January 2013
-
Markoff, J. (2010) Worm can deal double blow to nuclear program. New York Times 19 November, http://www .nytimes.com/2010/11/20/world/middleeast/20stuxnet.html?ref=technology, accessed 17 January 2013.
-
(2010)
Worm Can Deal Double Blow to Nuclear Program
-
-
Markoff, J.1
-
18
-
-
84870243026
-
An integrated conceptual digital forensic framework for cloud computing
-
Martini, B. and Choo, K.K.R. (2012) An integrated conceptual digital forensic framework for cloud computing. Digital Investigation 9(2): 71-80.
-
(2012)
Digital Investigation
, vol.9
, Issue.2
, pp. 71-80
-
-
Martini, B.1
Choo, K.K.R.2
-
20
-
-
84963534539
-
Incident management an immediate reply
-
Montgomery, J. and Bueker, T. (2010) Incident management an immediate reply. Thinking Highways 5(1): 48-50.
-
(2010)
Thinking Highways
, vol.5
, Issue.1
, pp. 48-50
-
-
Montgomery, J.1
Bueker, T.2
-
21
-
-
84861093550
-
SCADA security in the light of cyber-warfare
-
Nicholson, A., Webber, S., Dyer, S., Patel, T. and Janicke, H. (2012) SCADA security in the light of cyber-warfare. Computers & Security 31(4): 418-436.
-
(2012)
Computers & Security
, vol.31
, Issue.4
, pp. 418-436
-
-
Nicholson, A.1
Webber, S.2
Dyer, S.3
Patel, T.4
Janicke, H.5
-
22
-
-
79960945332
-
New technology: Opportunities and challenges for prosecutors
-
Pallaras, S. (2011) New technology: Opportunities and challenges for prosecutors. Crime, Law and Social Change 56(1): 71-89.
-
(2011)
Crime, Law and Social Change
, vol.56
, Issue.1
, pp. 71-89
-
-
Pallaras, S.1
-
24
-
-
84963508339
-
Chapter 17-becoming an expert witness
-
2nd edn., 9 June
-
Shinder, L. and Cross, M. (eds.) (2008) Chapter 17-becoming an expert witness. In: Scene of the Cybercrime, 2nd edn., 9 June, pp. 693-725.
-
(2008)
Scene of the Cybercrime
, pp. 693-725
-
-
Shinder, L.1
Cross, M.2
-
29
-
-
80755176488
-
-
TISN.
-
TISN. (2005) SCADA Security-Advice for CEOs, 12 January, http://www.ema.gov.au/agd/WWW/rwpattach.nsf/VAP/(930C12A9101F61D43493D44C70E84EAA)~SCADA+Security.pdf/file/SCADA+Security.pdf.
-
(2005)
SCADA Security-Advice for CEOs, 12 January
-
-
|