зеркало из
https://github.com/M82-project/Bibliography.git
synced 2025-10-29 13:06:06 +02:00
Update Articles_essentiels.bib
Этот коммит содержится в:
родитель
cdc1eebede
Коммит
a28b8a189e
@ -18,6 +18,16 @@
|
||||
----------------------------------------------------------------------------------------------------------------------------------------------------------------
|
||||
@comment {A}
|
||||
@comment {B}
|
||||
|
||||
@article{bianco2013pyramid,
|
||||
title={The pyramid of pain},
|
||||
author={Bianco, David},
|
||||
journal={Enterprise Detection \& Response},
|
||||
year={2013},
|
||||
note = {Post fondateur ou l'auteur développe le concept de la pyramide of pain qui consiste à classer les artefacts en focntion de la difficulté à les détecter (pour le défenseur) ou à les mettre en ouevre (pour l'attaquant)},
|
||||
url = {http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html}
|
||||
}
|
||||
|
||||
@comment {C}
|
||||
@comment {D}
|
||||
@comment {E}
|
||||
@ -31,14 +41,14 @@
|
||||
@comment {M}
|
||||
@comment {N}
|
||||
|
||||
@article{Nimmo,
|
||||
@article{Nimmo2015anatomy,
|
||||
author = {Ben Nimmo},
|
||||
title = {Anatomy of an info-war:how Russia's propaganda machine works, and how to counter it},
|
||||
journal = {Central European Policy Institute},
|
||||
number = {15},
|
||||
year = {2015},
|
||||
keywords = {désinformation, propagande, Russie, infowar}
|
||||
note = {},
|
||||
keywords = {désinformation, propagande, Russie, infowar},
|
||||
note = {}
|
||||
}
|
||||
|
||||
@comment {O}
|
||||
@ -47,9 +57,33 @@
|
||||
@comment {R}
|
||||
@comment {S}
|
||||
@comment {T}
|
||||
|
||||
@article{thompson2020threat,
|
||||
title={Threat hunting},
|
||||
author={Thompson, Eric C and Thompson, Eric C},
|
||||
journal={Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events},
|
||||
pages={205--212},
|
||||
year={2020},
|
||||
publisher={Springer},
|
||||
pdf = {https://link.springer.com/chapter/10.1007/978-1-4842-5608-4_7},
|
||||
note = {article qui pose les base du threat hunting}
|
||||
}
|
||||
|
||||
@comment {U}
|
||||
@comment {V}
|
||||
@comment {W}
|
||||
|
||||
@article{warikoo2021triangle,
|
||||
title={The triangle model for cyber threat attribution},
|
||||
author={Warikoo, Arun},
|
||||
journal={Journal of Cyber Security Technology},
|
||||
volume={5},
|
||||
number={3-4},
|
||||
pages={191--208},
|
||||
year={2021},
|
||||
publisher={Taylor \& Francis}
|
||||
}
|
||||
|
||||
@comment {X}
|
||||
@comment {Y}
|
||||
@comment {Z}
|
||||
|
||||
Загрузка…
x
Ссылка в новой задаче
Block a user