Search This Blog

4.01.2020

Basic Bibliography for cyber intelligence:

Andress, J. & Winterfeld, S. (2011). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Boston, MA: Syngress.
Bouchard, M., and H. Nguyen. (2009) “Is it Who You Know or How Many That Counts? Criminal Networks and Cost Avoidance in a Sample of Young Offenders.” Justice Quarterly 27, no. 1

Brenner, Susan. Cyberthreats: The Emerging Fault Lines of the Nation State. New York: Oxford University Press, 2008.

Chandler and R Boadhurst, "Social Engineering and Crime Prevention in Cyberspace," Queensland Univeristy of Technology, Brisbane, 2006.

Carr, J. (2011). Inside Cyber Warfare: Mapping the Cyber Underworld. Sebastopol, CA: O'Reilly Media Incorporated.
Clarke, R.A. and Knake, R.K. (2010). Cyber War: The Next Threat to National Security and What to Do About It New York, NY: Ecco.
Decary-Hetu, David, and Benoit Dupont. “The Social Network of Hackers.” Global Crime 13 (2012)

F. Barbhuiya, S. Biswas, N. Hubballi, and S. Nandi, “A host based DES approach for detecting arp spoofing,” in Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, april 2011

Holt, Thomas J., Deborah Strumsky, Olga Smirnova, and Max Kilger. “Examining the Social Networks of Malware Writers and Hackers.” International Journal of Cyber Criminology 6 (2012)

Holt, Thomas J., and Eric Lampke. “Exploring Stolen Data Markets On-line: Products and Market Forces.” Criminal Justice Studies 23 (2010)


Kramer, F.D., Starr, S.H., & Wentz, L. eds. (2009). Cyberpower and National Security. Washington D.C.: National Defense University Press and Potomac Books.

Lowenthal, Mark M. Intelligence: From Secrets to Policy. 5th ed. Washington, DC: CQ Press, 2012.
Liu, E.C., (2013, January). Reauthorization of the FISA Amendments. Congressional Research Service Report for Congress, 7-5700, R42725. Available online at: http://www.fas.org/sgp/crs/intel/R42725.pdf.
Menn, J. (2010). Fatal System Error, New York, NY: Public Affairs.
Tremblay, P., M. Bouchard, and S. Petit. “The Size and Influence of a Criminal Organization: A Criminal Achievement Perspective.” Global Crime 10 (2009)
Markham, Annette N. “Internet Research.” In Qualitative Research: Issues of Theory, Method, and Practice. 3rd ed., edited by David Silverman, 111-127. Thousand Oaks, CA: Sage, 2011.

M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, “A detailed analysis of the kdd cup 99 data set,” in Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on, july 2009
O. Linda, M. Manic, T. Vollmer, and J. Wright, “Fuzzy logic based anomaly detection for embedded network security cyber sensor,” in Computational Intelligence in Cyber Security (CICS), 2011 IEEE Sym­posium on, april 2011
S. Yu and D. Dasgupta, “An effective network-based intrusion detection using conserved self pattern recognition algorithm augmented with near-deterministic detector generation,” in Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, april 2011

Wang, Q., W. T. Yue, and K. Hui. (2012) “Do Hacker Forums Contribute to Security Attacks?” Lecture Notes In Business Information Processing 108

Internet sources
Frontline: Behind Taliban Lines, February 23,2010. Available online at:
Federation of American Scientists publishes various reports at http://www.fas.org/pubs/briefs.html or http://www.fas.org/blog/secrecv/.
http://www.ncix.gov/publications/reports/fecie all/Foreign Economic Collection 2011.pdf.
Cyberwar: War in the Fifth Domain. (2010). The Economist. Online at: http://www.economist.com/node/16478792
Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. This text is a 2010 compilation of papers prepared by the National Research Council. For more information: http://www.nap.edu/catalog.php7record id=12997.
FBI. “Directorate of Intelligence, Intelligence Collection Disciplines.” http://www.fbi.gov/about-us/intelligence/disciplines

Chu, Bill, Thomas J. Holt, and Gail Joon Ahn. Examining the Creation, Distribution, and Function of Malware On-Line. Washington, DC: National Institute of Justice, 2010. Accessed April 11, 2011. http://www.ncjrs.gov/pdffiles1/nij/grants/230112.pdf.

Dunn, Justin E. “Russia Cybercrime Market Doubles in 2011, Says Report.” IT World (2012). Accessed September 23. http://www.itworld.com/security/272448/russia-cybercrime-market- doubles-2011-says-report.

 Symantec Corporation. Symantec Internet Security Threat Report, Vol. 17. Accessed June 20, 2012.             http://www.symantec.com/threatreport.

3 comments:

online courses said...

Autonomous information shops are sourced from information caught from at least one operational frameworks or outside data suppliers, or from information produced locally inside a specific division or geographic zone. artificial intelligence course

Home Improvement said...

Great post i must say and thanks for the information. Education is definitely a sticky subject. However, is still among the leading topics of our time. I appreciate your post and look forward to more. pareto chart

Anonymous said...

Tom Austin, the executive director of Education Alliance USA for Ukraine, visited the State Tax University and was impressed by the resilience of the Ukrainian people. https://dpu.edu.ua/novyny/amerykanskii-hist-dpu-vyslovyv-zakhoplennia-ukrainskoiu-nezlamnistiu