зеркало из
https://github.com/M82-project/Bibliography.git
synced 2025-10-29 21:16:11 +02:00
Merge pull request #10 from principeM82/principeM82-patch-1
Update mars_2023.bib
Этот коммит содержится в:
Коммит
fa2c960813
155
mars_2023.bib
155
mars_2023.bib
@ -84,8 +84,8 @@
|
||||
|
||||
@book{étiquette,
|
||||
author = {Arquilla, John and Ronfeldt, David},
|
||||
title = {Networks and Netwar: the Future of Terror, Crime and Militancy},
|
||||
year = {2002},
|
||||
title = {Networks and Netwars: the Future of Terror, Crime and Militancy},
|
||||
year = {2001},
|
||||
publisher= {Rand},
|
||||
Keyword={Cyberguerre}}
|
||||
|
||||
@ -117,9 +117,15 @@
|
||||
note = {Désinformation},
|
||||
keyword = {Désinformation, Propagande}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Benkler, Yochai and Faris, Robert and Robert, Hal},
|
||||
title = {Network propaganda: Manipulation, Disinformation, Radicalization in American Politics},
|
||||
year = {20&!},
|
||||
publisher= {Oxford University Press},
|
||||
keyword={Désinformation, Propagande}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Billois, Gérôme AND Nicolas, Cougot},
|
||||
author = {Billois, Gérôme AND Cougot, Nicolas},
|
||||
title = {Cyberattaques, les dessous d'une menace mondiale},
|
||||
year = {2022},
|
||||
publisher= {Hachette},
|
||||
@ -190,27 +196,14 @@
|
||||
year = {2014},
|
||||
publisher= {NUVIS},
|
||||
keyword={Cyberguerre, Cyberstratégie}}
|
||||
|
||||
@book{braddock2020weaponized,
|
||||
title={Weaponized words: The strategic role of persuasion in violent radicalization and counter-radicalization},
|
||||
author={Braddock, Kurt},
|
||||
year={2020},
|
||||
publisher={Cambridge University Press}}
|
||||
|
||||
|
||||
@article{boyer2017influence,
|
||||
title={L’influence {\guillemotleft}au contact{\guillemotright} et au clavier},
|
||||
author={Boyer, Bertrand},
|
||||
journal={DSI (D{\'e}fense et S{\'e}curit{\'e} Internationale)},
|
||||
number={131},
|
||||
pages={34--39},
|
||||
year={2017},
|
||||
publisher={JSTOR},
|
||||
keyword={Guerre de l'information, Influence}}
|
||||
|
||||
|
||||
@article{boyer2017countering,
|
||||
title={Countering hybrid threats in cyberspace},
|
||||
author={Boyer, Bertrand},
|
||||
journal={Cyber Defense Review},
|
||||
volume={2},
|
||||
year={2017},
|
||||
keyword={Cyberguerre, Guerre Hybride}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
author = {Brenner,Susan},
|
||||
@ -377,8 +370,8 @@
|
||||
|
||||
|
||||
@book{denardis2020internet,
|
||||
title={The Internet in everything},
|
||||
author={DeNardis, Laura},
|
||||
title={The Internet in everything},
|
||||
year={2020},
|
||||
publisher={Yale University Press}}
|
||||
|
||||
@ -422,29 +415,6 @@
|
||||
keyword={Cyberdéfense, Cyberguerre}}
|
||||
|
||||
|
||||
@article{douzet2014geopolitique,
|
||||
title={G{\'e}opolitique du cyberespace: La cyberstrat{\'e}gie de l’administration Obama},
|
||||
author={Douzet, Fr{\'e}d{\'e}rick},
|
||||
journal={Bulletin de l’association de g{\'e}ographes fran{\c{c}}ais. G{\'e}ographies},
|
||||
volume={91},
|
||||
number={91-2},
|
||||
pages={138--149},
|
||||
year={2014},
|
||||
publisher={Association de g{\'e}ographes fran{\c{c}}ais},
|
||||
keyword={Cyberstratégie, USA, Géopolitique}}
|
||||
|
||||
|
||||
@article{douzet2014art,
|
||||
title={L’art de la guerre revisit{\'e}. Cyberstrat{\'e}gie et cybermenace chinoises},
|
||||
author={Douzet 1, Fr{\'e}d{\'e}rick},
|
||||
journal={H{\'e}rodote},
|
||||
number={1-2},
|
||||
pages={161--173},
|
||||
year={2014},
|
||||
publisher={Cairn/Isako},
|
||||
keyword={Cyberstratégie, Chine, Géopolitique}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
author = {Dykstra, Josiah and Spafford Eugene and Metcalf Leigh},
|
||||
title = {Cybersecurity myths and Misconceptions},
|
||||
@ -496,6 +466,13 @@
|
||||
note = {Destiné aux acteurs de la sécurité informatique dans le domaine des systèmes industriels},
|
||||
isbn = {9782364931688},
|
||||
keyword={Cybersécurité, systèmes industriels, SCADA}}
|
||||
|
||||
|
||||
@book{cukier2022framers,
|
||||
title={Framers: Human advantage in an age of technology and turmoil},
|
||||
author={Cukier, Kenneth and Mayer-Sch{\"o}nberger, Viktor and de V{\'e}ricourt, Francis},
|
||||
year={2022},
|
||||
publisher={Penguin}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
@ -541,17 +518,6 @@
|
||||
publisher= {Les éditions du Cerf}}
|
||||
|
||||
|
||||
@article{giry2021fake,
|
||||
title={Les fake news comme concept de sciences sociales: Essai de cadrage {\`a} partir de notions connexes: rumeurs, th{\'e}ories du complot, propagande et d{\'e}sinformation},
|
||||
author={Giry, Julien},
|
||||
journal={Questions de communication},
|
||||
volume={38},
|
||||
pages={371--394},
|
||||
year={2021},
|
||||
publisher={Cairn},
|
||||
keyword={Désinformation, Fake News}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
author = {Greenberg, Andy},
|
||||
title = {Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers},
|
||||
@ -646,15 +612,6 @@
|
||||
note={un indispensable pour tout analyste traitant de la donnée en vue de fournir du renseignement}}
|
||||
|
||||
|
||||
@article{hoorickx2019etats,
|
||||
title={Les {\'E}tats, acteurs cl{\'e}s de la cyberstrat{\'e}gie euro-atlantique 1},
|
||||
author={Hoorickx, Estelle},
|
||||
journal={Revue D{\'e}fense Nationale},
|
||||
number={3},
|
||||
pages={93--98},
|
||||
year={2019},
|
||||
publisher={Cairn/Inovcom}}
|
||||
|
||||
|
||||
@book{hubbard2023measure,
|
||||
title={How to measure anything in cybersecurity risk},
|
||||
@ -693,10 +650,15 @@
|
||||
|
||||
|
||||
J
|
||||
@book{jamieson2020cyberwar,
|
||||
title={Cyberwar: how Russian hackers and trolls helped elect a president: what we don't, can't, and do know},
|
||||
author={Jamieson, Kathleen Hall},
|
||||
year={2020},
|
||||
publisher={Oxford University Press}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
author = {Janczewsky, Lech and Andrew, Colarik},
|
||||
author = {Janczewsky, Lech and Colarik, Andrew},
|
||||
title = {Cyber warfare and Cyberterrorism},
|
||||
year = {2007},
|
||||
publisher= {Information Science Reference}}
|
||||
@ -704,14 +666,19 @@
|
||||
|
||||
@book{étiquette,
|
||||
author= {Jankowicz, Nina},
|
||||
title = {How to lose the Information War},
|
||||
title = {How to lose the Information War: Russia, Fake News and the Future of Conflict},
|
||||
year = {2020},
|
||||
publisher= {Bloomsbury}}
|
||||
publisher= {I. B. Tauris}}
|
||||
|
||||
|
||||
K
|
||||
|
||||
|
||||
@book{kaiser2019targeted,
|
||||
title={Targeted},
|
||||
author={Kaiser, Brittany},
|
||||
year={2019},
|
||||
publisher={Harper Collins Publishers}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Kaplan, Fred},
|
||||
title = {Dark Territory: The Secret History of Cyber War},
|
||||
@ -726,38 +693,6 @@
|
||||
publisher= {Economica}}
|
||||
|
||||
|
||||
@article{kempf2012cyberstrategie,
|
||||
title={Cyberstrat{\'e}gie {\`a} la fran{\c{c}}aise},
|
||||
author={Kempf, Olivier},
|
||||
journal={Revue internationale et strategique},
|
||||
volume={87},
|
||||
number={3},
|
||||
pages={121--129},
|
||||
year={2012},
|
||||
publisher={IRIS {\'e}ditions}}
|
||||
|
||||
|
||||
@article{kempf2014cyberstrategie,
|
||||
title={La cyberstrat{\'e}gie française},
|
||||
author={Kempf, Olivier},
|
||||
journal={Recherches Internationales},
|
||||
volume={100},
|
||||
number={1},
|
||||
pages={135--151},
|
||||
year={2014},
|
||||
publisher={Pers{\'e}e-Portail des revues scientifiques en SHS}}
|
||||
|
||||
|
||||
@article{kempf2013cyberstrategie,
|
||||
title={La cyberstrat{\'e}gie de l’Union Europ{\'e}enne},
|
||||
author={Kempf, Olivier},
|
||||
journal={S{\'e}curit{\'e} globale},
|
||||
number={2},
|
||||
pages={25--40},
|
||||
year={2013},
|
||||
publisher={Cairn/Softwin}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
author = {Kitchin, Rob},
|
||||
title = {The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences},
|
||||
@ -799,15 +734,6 @@
|
||||
publisher={ISTE Group}}
|
||||
|
||||
|
||||
@article{lee2021blockchain,
|
||||
title={Blockchain as a cyber defense: opportunities, applications, and challenges},
|
||||
author={Lee, Suhyeon and Kim, Seungjoo},
|
||||
journal={IEEE Access},
|
||||
volume={10},
|
||||
pages={2602--2618},
|
||||
year={2021},
|
||||
publisher={IEEE}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
author = {Le Dez, Arnaud},
|
||||
@ -983,6 +909,13 @@
|
||||
year = {2010},
|
||||
publisher= {Harvard University}}
|
||||
|
||||
O
|
||||
@book{chopin2019renseignement,
|
||||
title={Renseignement et s{\'e}curit{\'e}-2e {\'e}d.},
|
||||
author={Chopin, Olivier and Oudet, Benjamin},
|
||||
year={2019},
|
||||
publisher={Armand Colin}}
|
||||
|
||||
|
||||
P
|
||||
|
||||
|
||||
Загрузка…
x
Ссылка в новой задаче
Block a user