%Nous rassemblons ici des articles fondateurs dans les domaines de la cybersécurité, de la cyberdéfense et de la lutte contre la manipulation numérique %merci d'utiliser le format ci-dessous pour saisir vos propositions %Here we bring together seminal articles in the fields of cybersecurity, cyber defence and the fight against digital manipulation %Please use the format below to enter your proposals @article{Johnson, author = {Edgar G. Johnson and Alfred O. Nier}, title = {Angular Aberrations in Sector Shaped Electromagnetic Lenses for Focusing Beams of Charged Particles}, journal = {Physical Review}, volume = {91}, number = {1}, month = {jul}, year = {1953} } ---------------------------------------------------------------------------------------------------------------------------------------------------------------- @comment {A} @comment {B} @article{bianco2013pyramid, title={The pyramid of pain}, author={Bianco, David}, journal={Enterprise Detection \& Response}, year={2013}, note = {Post fondateur ou l'auteur développe le concept de la pyramide of pain qui consiste à classer les artefacts en focntion de la difficulté à les détecter (pour le défenseur) ou à les mettre en ouevre (pour l'attaquant)}, url = {http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html} } @article{bouchaud2023browsing, title={Browsing Amazon's Book Bubbles}, author={Bouchaud, Paul}, year={2023}, url={https://hal.science/hal-04308081}, keywords={Amazon, filter bubble, Collaborative Filtering} } @comment {C} @article{cattaruzza2018enjeux, title={Les enjeux de la num{\'e}risation du champ de bataille}, author={Cattaruzza, Ama{\"e}l and Taillat, St{\'e}phane}, journal={Dynamiques internationales}, number={13}, year={2018}, pdf={https://hal.science/hal-01811385/document} } @article{cartwright_economics_2023, title = {The economics of ransomware attacks on integrated supply chain networks}, url = {https://www.scinapse.io/papers/4319921249}, doi = {10.1145/3579647}, abstract = {Anna Cartwright}, language = {en}, urldate = {2023-11-29}, journal = {Digital threats}, author = {Cartwright, Anna and Cartwright, Edward}, month = feb, year = {2023}, } @article{chavalarias2024can, title={Can a single line of code change society? the systemic risks of optimizing engagement in recommender systems on global information flow, opinion dynamics and social structures}, author={Chavalarias, David and Bouchaud, Paul and Panahi, Maziyar}, journal={Journal of Artificial Societies and Social Simulation}, volume={27}, number={1}, pages={1--9}, year={2024}, publisher={Journal of Artificial Societies and Social Simulation} } @article{chavalarias2012societe, title={La soci{\'e}t{\'e} recommand{\'e}e}, author={Chavalarias, David}, journal={Conflits des interpr{\'e}tations dans la soci{\'e}t{\'e} de l'information: thique et politique de l'environnement}, pages={26--39}, year={2012}, publisher={Lavoisier} } @comment {D} @techreport{darcy2025lutter, title={Lutter contre la d{\'e}sinformation: Penser autrement l’action publique {\`a} l'aune des sciences cognitives}, author={Darcy, Gr{\'e}goire and Mercier, Hugo and Mari, Alda and Casati, Roberto}, year={2025}, institution={Center for Open Science}, url = {https://osf.io/preprints/osf/fu9cz_v1} } @article{douzet2020cyberespace, title={Le cyberespace, {\c{c}}a sert, d’abord, {\`a} faire la guerre. Prolif{\'e}ration, s{\'e}curit{\'e} et stabilit{\'e} du cyberespace}, author={Douzet, Fr{\'e}d{\'e}rick and G{\'e}ry, Aude}, journal={H{\'e}rodote}, number={2-3}, pages={329--350}, year={2020}, url = {https://www.cairn.info/revue-herodote-2020-2-page-329.htm}, publisher={Cairn/Cairn} } @article{douzet2020cartographier, title={Cartographier la propagation des contenus russes et chinois sur le Web africain francophone}, author={Douzet, Fr{\'e}d{\'e}rick and Limonier, K{\'e}vin and Mihoubi, Selma and Ren{\'e}, {\'E}lodie}, journal={H{\'e}rodote}, number={2-3}, pages={77--99}, year={2020}, url = {https://www.cairn.info/revue-herodote-2020-2-page-77.htm}, publisher={Cairn/Cairn} } @article{douzet2018cyberespace, title={Du cyberespace {\`a} la datasph{\`e}re. Le nouveau front pionnier de la g{\'e}ographie}, author={Douzet, Fr{\'e}d{\'e}rick and Desforges, Alix}, journal={Netcom. R{\'e}seaux, communication et territoires}, number={32-1/2}, pages={87--108}, year={2018}, keyword = {datasphère, cyberespace, révolution numérique, géopolitique, diplomatie}, url = {https://journals.openedition.org/netcom/3419}, publisher={Netcom Association} } @comment {E} @comment {F} @comment {G} @article{glasze2023contested, title={Contested spatialities of digital sovereignty}, author={Glasze, Georg and Cattaruzza, Ama{\"e}l and Douzet, Fr{\'e}d{\'e}rick and Dammann, Finn and Bertran, Marie-Gabrielle and B{\^o}mont, Clotilde and Braun, Matthias and Danet, Didier and Desforges, Alix and G{\'e}ry, Aude and others}, journal={Geopolitics}, volume={28}, number={2}, pages={919--958}, year={2023}, pdf = {https://www.tandfonline.com/doi/pdf/10.1080/14650045.2022.2050070}, publisher={Taylor \& Francis} } @article{gompert2014cyber, title={Cyber warfare and Sino-American crisis instability}, author={Gompert, David C and Libicki, Martin}, journal={Survival}, volume={56}, number={4}, pages={7--22}, year={2014}, publisher={Taylor \& Francis}, keyword = {Stratégie, Chine, USA}, pdf = {https://www.tandfonline.com/doi/pdf/10.1080/00396338.2014.941543} } @article{grelot2021automation, title={Automation of Binary Analysis: From Open Source Collection to Threat Intelligence}, author={Grelot, Frederic and Larinier, Sebastien and Salmon, Marie}, journal={Proceedings of the 28th C\&ESAR}, volume={41}, year={2021}, publisher={CEUR-WS Aachen, Germany}, pdf = {https://www.researchgate.net/profile/Marie-Salmon-2/publication/365361058_Automation_of_Binary_Analysis_From_Open_Source_Collection_to_Threat_Intelligence/links/6371fe4837878b3e87ad6e41/Automation-of-Binary-Analysis-From-Open-Source-Collection-to-Threat-Intelligence.pdf} } @comment {H} @article{hanford2014cold, title={The Cold War of Cyber Espionage}, author={Hanford, Elizabeth}, journal={Pub. Int. L. Rep.}, volume={20}, pages={22}, year={2014}, publisher={HeinOnline}, pdf = {https://lawecommons.luc.edu/cgi/viewcontent.cgi?article=1214&context=pilr} } @article{howard2018ira, title={The IRA, social media and political polarization in the United States, 2012-2018}, author={Howard, Philip N and Ganesh, Bharath and Liotsiou, Dimitra and Kelly, John and Fran{\c{c}}ois, Camille}, year={2018}, publisher={Project on Computational Propaganda}, url={https://research.rug.nl/en/publications/the-ira-social-media-and-political-polarization-in-the-united-sta} } @comment {I} @comment {J} @comment {K} @article{kok2020cyber, title={Cyber Threat Prediction with Machine Learning}, author={Kok, Arvid and Mestric, Ivana Ilic and Valiyev, Giavid and Street, Michael}, journal={Information \& Security}, volume={47}, number={2}, pages={203--220}, year={2020}, publisher={ProCon Ltd.}, pdf = {https://connections-qj.org/system/files/4714_cyber_threat_assessment.pdf} } @comment {L} @article{li_comprehensive_2021, title={A comprehensive review study of cyber-attacks and cyber security; {Emerging} trends and recent developments}, author={Li, Yuchong and Liu, Qinghui}, journal={Energy Reports}, volume={7}, issn = {2352-4847}, url = {https://www.sciencedirect.com/science/article/pii/S2352484721007289}, doi = {10.1016/j.egyr.2021.08.126}, year={2021}, note = {Une revue de littérature définissant les concepts clés de la cyberdéfense (cyberattaque, cybersécurité, etc.)} } @article{libicki2012cyberspace, title={Cyberspace is not a warfighting domain}, author={Libicki, Martin C}, journal={Isjlp}, volume={8}, pages={321}, year={2012}, publisher={HeinOnline}, note = {Au-delà du titre provocateur cet article est essentiel à la compréhension de la pensée stratégique américaine sur le cyberespace. L'auteur y développe un concept original pour mieux appréhender l'action dans le cyberespace et ne pas en faire un simple "domaine" de confrontation supplèmentaire.}, pdf = {https://kb.osu.edu/server/api/core/bitstreams/0f5c21be-28f3-5951-926c-6bdcab243319/content}, keyword = {stratégie, cyberwarfare, cyberdéfense, USA} } @article{libicki2015cyber, title={The cyber war that wasn’t}, author={Libicki, Martin and Geers, Kenneth}, journal={Cyber war in perspective: Russian aggression against Ukraine}, pages={49--54}, year={2015}, publisher={NATO Cyber Center of Excellence, NATO CCD COE Tallinn, Estonia}, pdf = {https://ccdcoe.org/uploads/2018/10/Ch05_CyberWarinPerspective_Libicki.pdf} } @comment {M} @comment {N} @article{Nimmo2015anatomy, author = {Ben Nimmo}, title = {Anatomy of an info-war:how Russia's propaganda machine works, and how to counter it}, journal = {Central European Policy Institute}, number = {15}, year = {2015}, keywords = {désinformation, propagande, Russie, infowar}, note = {} } @comment {O} @article{oruc2022assessing, title={Assessing cyber risks of an INS using the MITRE ATT\&CK framework}, author={Oruc, Aybars and Amro, Ahmed and Gkioulos, Vasileios}, journal={Sensors}, volume={22}, number={22}, pages={8745}, year={2022}, publisher={MDPI}, note = {Article utile pour ceux qui travaillent dans la cybersécurité maritime}, keyword = {navigation, MITRE ATT\&CK, marine} } @inproceedings{ozkan2023zero, title={Zero-Day Operational Cyber Readiness}, author={{\"O}zkan, Bar{\i}{\c{s}} Egemen and Tolga, {\.I}hsan B}, booktitle={2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)}, pages={199--215}, year={2023}, organization={IEEE}, note = {Publication de la célébre conf CyCon qui présente le concept de Zero-Day Readiness pour faire face aux défis de la connectivité permanente}, pdf = {https://ieeexplore.ieee.org/abstract/document/10181814} } @comment {P} @comment {Q} @comment {R} @article{raad2024protecting, title={Protecting freedom of thought: mitigating technological enablers of disinformation}, author={Raad, Alexa}, year={2024}, pdf={https://apo.org.au/sites/default/files/resource-files/2024-01/apo-nid325403.pdf}, publisher={Centre for International Governance Innovation} } @comment {S} @comment {T} @article{tabansky2011basic, title={Basic concepts in cyber warfare}, author={Tabansky, Lior}, journal={Military and Strategic Affairs}, volume={3}, number={1}, pages={75--92}, year={2011}, pdf = {https://indianstrategicknowledgeonline.com/web/1308129610.pdf}, note = {synthèse assez complète de la vision du concept de cyberwarfare dans les années 2010} } @article{thompson2020threat, title={Threat hunting}, author={Thompson, Eric C and Thompson, Eric C}, journal={Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events}, pages={205--212}, year={2020}, publisher={Springer}, pdf = {https://link.springer.com/chapter/10.1007/978-1-4842-5608-4_7}, note = {article qui pose les base du threat hunting} } @article{tor2017cumulative, title={‘Cumulative deterrence’as a new paradigm for cyber deterrence}, author={Tor, Uri}, journal={Journal of Strategic Studies}, volume={40}, number={1-2}, pages={92--117}, year={2017}, url={https://www.tandfonline.com/doi/abs/10.1080/01402390.2015.1115975}, publisher={Taylor \& Francis} } @article{article, author = {Turunen, Maija and Kari, Martti}, year = {2022}, month = {03}, pages = {433-439}, title = {Cumulative Cyber Deterrence}, volume = {17}, journal = {International Conference on Cyber Warfare and Security}, doi = {10.34190/iccws.17.1.55} } @comment {U} @comment {V} @article{vosoughi_spread_2018, title = {The spread of true and false news online}, volume = {359}, issn = {0036-8075, 1095-9203}, url = {https://www.science.org/doi/10.1126/science.aap9559}, doi = {10.1126/science.aap9559}, language = {en}, number = {6380}, urldate = {2023-11-03}, journal = {Science}, author = {Vosoughi, Soroush and Roy, Deb and Aral, Sinan}, month = {mar}, year = {2018}, pages = {1146--1151}, file = {Vosoughi et al. - 2018 - The spread of true and false news online.pdf:files/3731/Vosoughi et al. - 2018 - The spread of true and false news online.pdf:application/pdf}, } @article{vemprala2021Debunk, title = {Debunking Misinformation Using a Game Theoretic Approach}, author = {Vemprala, Naga and Gudigantala, Naveen and Chaganti, Raj}, year = {2021}, moth = {06}, journal = {Emergent Research Forum (ERF)} } @comment {W} @article{warikoo2021triangle, title={The triangle model for cyber threat attribution}, author={Warikoo, Arun}, journal={Journal of Cyber Security Technology}, volume={5}, number={3-4}, pages={191--208}, year={2021}, publisher={Taylor \& Francis} } @comment {X} @comment {Y} @comment {Z}