Andress, J. & Winterfeld,
S. (2011). Cyber Warfare: Techniques,
Tactics and Tools for Security Practitioners. Boston, MA: Syngress.
Bouchard, M., and H. Nguyen. (2009) “Is it Who You
Know or How Many That Counts? Criminal Networks and Cost Avoidance in a Sample
of Young Offenders.” Justice Quarterly 27, no. 1
Brenner, Susan. Cyberthreats: The Emerging Fault Lines of the
Nation State. New York: Oxford University Press, 2008.
Chandler and R Boadhurst, "Social Engineering and Crime Prevention
in Cyberspace," Queensland Univeristy of Technology, Brisbane, 2006.
Carr, J.
(2011). Inside
Cyber Warfare: Mapping the Cyber Underworld.
Sebastopol, CA: O'Reilly Media Incorporated.
Clarke, R.A. and Knake, R.K.
(2010). Cyber War: The Next Threat to
National Security and What to Do About It New York, NY: Ecco.
Decary-Hetu, David, and
Benoit Dupont. “The Social Network of Hackers.” Global Crime 13 (2012)
F. Barbhuiya, S. Biswas, N. Hubballi, and S. Nandi, “A host based DES
approach for detecting arp spoofing,” in Computational Intelligence in Cyber Security
(CICS), 2011 IEEE Symposium on, april 2011
Holt, Thomas J., Deborah Strumsky, Olga Smirnova, and Max Kilger.
“Examining the Social Networks of Malware Writers and Hackers.” International Journal of Cyber Criminology 6 (2012)
Holt, Thomas J., and Eric Lampke. “Exploring
Stolen Data Markets On-line: Products and Market Forces.” Criminal Justice Studies 23 (2010)
Kramer,
F.D., Starr, S.H., & Wentz, L. eds. (2009). Cyberpower and National Security.
Washington D.C.: National Defense University Press and Potomac Books.
Lowenthal,
Mark M. Intelligence: From Secrets to Policy. 5th ed. Washington, DC: CQ Press,
2012.
Liu,
E.C., (2013, January). Reauthorization of the FISA Amendments. Congressional
Research Service Report for Congress, 7-5700, R42725. Available online at: http://www.fas.org/sgp/crs/intel/R42725.pdf.
Menn, J.
(2010). Fatal
System Error, New York, NY: Public Affairs.
Tremblay, P., M. Bouchard, and S. Petit. “The
Size and Influence of a Criminal Organization: A Criminal Achievement
Perspective.” Global
Crime 10 (2009)
Markham, Annette N. “Internet Research.” In Qualitative Research: Issues of Theory, Method,
and Practice. 3rd ed., edited by David Silverman, 111-127.
Thousand Oaks, CA: Sage, 2011.
M.
Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, “A detailed analysis of the kdd
cup 99 data set,” in Computational
Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE
Symposium on, july 2009
O.
Linda, M. Manic, T. Vollmer, and J. Wright, “Fuzzy logic based anomaly
detection for embedded network security cyber sensor,” in Computational Intelligence in Cyber Security
(CICS), 2011 IEEE Symposium on, april
2011
S. Yu
and D. Dasgupta, “An effective network-based intrusion detection using
conserved self pattern recognition algorithm augmented with near-deterministic
detector generation,” in Computational
Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, april
2011
Wang, Q., W. T. Yue, and K. Hui. (2012) “Do
Hacker Forums Contribute to Security Attacks?” Lecture Notes In Business Information
Processing 108
Internet
sources
Frontline:
Behind Taliban Lines, February 23,2010. Available online at:
Federation of American Scientists publishes
various reports at http://www.fas.org/pubs/briefs.html or http://www.fas.org/blog/secrecv/.
Cyberwar:
War in the Fifth Domain. (2010). The Economist. Online at: http://www.economist.com/node/16478792
Proceedings of a Workshop on Deterring
Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. This text is a 2010 compilation of papers
prepared by the National Research Council. For more information: http://www.nap.edu/catalog.php7record
id=12997.
FBI. “Directorate of Intelligence, Intelligence Collection
Disciplines.” http://www.fbi.gov/about-us/intelligence/disciplines
Chu, Bill, Thomas J. Holt, and Gail Joon Ahn. Examining the Creation, Distribution, and
Function of Malware On-Line. Washington, DC: National Institute of Justice,
2010. Accessed April 11, 2011. http://www.ncjrs.gov/pdffiles1/nij/grants/230112.pdf.
Dunn, Justin E. “Russia Cybercrime Market
Doubles in 2011, Says Report.” IT World (2012). Accessed September 23. http://www.itworld.com/security/272448/russia-cybercrime-market- doubles-2011-says-report.
Symantec Corporation. Symantec Internet Security Threat Report, Vol. 17. Accessed June 20, 2012. http://www.symantec.com/threatreport.
3 comments:
Autonomous information shops are sourced from information caught from at least one operational frameworks or outside data suppliers, or from information produced locally inside a specific division or geographic zone. artificial intelligence course
Great post i must say and thanks for the information. Education is definitely a sticky subject. However, is still among the leading topics of our time. I appreciate your post and look forward to more. pareto chart
Tom Austin, the executive director of Education Alliance USA for Ukraine, visited the State Tax University and was impressed by the resilience of the Ukrainian people. https://dpu.edu.ua/novyny/amerykanskii-hist-dpu-vyslovyv-zakhoplennia-ukrainskoiu-nezlamnistiu
Post a Comment