From a28b8a189e7e69aab6e8d2181dab066e44cd8e05 Mon Sep 17 00:00:00 2001 From: BartM82 <105561997+BartM82@users.noreply.github.com> Date: Tue, 31 Oct 2023 11:54:03 +0100 Subject: [PATCH] Update Articles_essentiels.bib --- Articles_essentiels.bib | 40 +++++++++++++++++++++++++++++++++++++--- 1 file changed, 37 insertions(+), 3 deletions(-) diff --git a/Articles_essentiels.bib b/Articles_essentiels.bib index 982ee0c..f28ad8f 100644 --- a/Articles_essentiels.bib +++ b/Articles_essentiels.bib @@ -18,6 +18,16 @@ ---------------------------------------------------------------------------------------------------------------------------------------------------------------- @comment {A} @comment {B} + +@article{bianco2013pyramid, + title={The pyramid of pain}, + author={Bianco, David}, + journal={Enterprise Detection \& Response}, + year={2013}, + note = {Post fondateur ou l'auteur développe le concept de la pyramide of pain qui consiste à classer les artefacts en focntion de la difficulté à les détecter (pour le défenseur) ou à les mettre en ouevre (pour l'attaquant)}, + url = {http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html} +} + @comment {C} @comment {D} @comment {E} @@ -31,14 +41,14 @@ @comment {M} @comment {N} -@article{Nimmo, +@article{Nimmo2015anatomy, author = {Ben Nimmo}, title = {Anatomy of an info-war:how Russia's propaganda machine works, and how to counter it}, journal = {Central European Policy Institute}, number = {15}, year = {2015}, - keywords = {désinformation, propagande, Russie, infowar} - note = {}, + keywords = {désinformation, propagande, Russie, infowar}, + note = {} } @comment {O} @@ -47,9 +57,33 @@ @comment {R} @comment {S} @comment {T} + +@article{thompson2020threat, + title={Threat hunting}, + author={Thompson, Eric C and Thompson, Eric C}, + journal={Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events}, + pages={205--212}, + year={2020}, + publisher={Springer}, + pdf = {https://link.springer.com/chapter/10.1007/978-1-4842-5608-4_7}, + note = {article qui pose les base du threat hunting} +} + @comment {U} @comment {V} @comment {W} + +@article{warikoo2021triangle, + title={The triangle model for cyber threat attribution}, + author={Warikoo, Arun}, + journal={Journal of Cyber Security Technology}, + volume={5}, + number={3-4}, + pages={191--208}, + year={2021}, + publisher={Taylor \& Francis} +} + @comment {X} @comment {Y} @comment {Z}