%Nous rassemblon ici des articles fondateurs dans les domaines de la cybersécurité, de la cyberdéfense et de la lutte contre la manipulation numérique %merci d'utiliser le format ci-dessous pour saisir vos propositions %Here we bring together seminal articles in the fields of cybersecurity, cyber defence and the fight against digital manipulation %Please use the format below to enter your proposals @article{Johnson, author = {Edgar G. Johnson and Alfred O. Nier}, title = {Angular Aberrations in Sector Shaped Electromagnetic Lenses for Focusing Beams of Charged Particles}, journal = {Physical Review}, volume = {91}, number = {1}, month = {jul}, year = {1953} } ---------------------------------------------------------------------------------------------------------------------------------------------------------------- @comment {A} @comment {B} @article{bianco2013pyramid, title={The pyramid of pain}, author={Bianco, David}, journal={Enterprise Detection \& Response}, year={2013}, note = {Post fondateur ou l'auteur développe le concept de la pyramide of pain qui consiste à classer les artefacts en focntion de la difficulté à les détecter (pour le défenseur) ou à les mettre en ouevre (pour l'attaquant)}, url = {http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html} } @comment {C} @comment {D} @comment {E} @comment {F} @comment {G} @comment {H} @comment {I} @comment {J} @comment {K} @article{kok2020cyber, title={Cyber Threat Prediction with Machine Learning}, author={Kok, Arvid and Mestric, Ivana Ilic and Valiyev, Giavid and Street, Michael}, journal={Information \& Security}, volume={47}, number={2}, pages={203--220}, year={2020}, publisher={ProCon Ltd.}, pdf = {https://connections-qj.org/system/files/4714_cyber_threat_assessment.pdf} } @comment {L} @comment {M} @comment {N} @article{Nimmo2015anatomy, author = {Ben Nimmo}, title = {Anatomy of an info-war:how Russia's propaganda machine works, and how to counter it}, journal = {Central European Policy Institute}, number = {15}, year = {2015}, keywords = {désinformation, propagande, Russie, infowar}, note = {} } @comment {O} @article{oruc2022assessing, title={Assessing cyber risks of an INS using the MITRE ATT\&CK framework}, author={Oruc, Aybars and Amro, Ahmed and Gkioulos, Vasileios}, journal={Sensors}, volume={22}, number={22}, pages={8745}, year={2022}, publisher={MDPI}, note = {Article utile pour ceux qui travaillent dans la cybersécurité maritime}, keyword = {navigation, MITRE ATT\&CK, marine} } @comment {P} @comment {Q} @comment {R} @comment {S} @comment {T} @article{tabansky2011basic, title={Basic concepts in cyber warfare}, author={Tabansky, Lior}, journal={Military and Strategic Affairs}, volume={3}, number={1}, pages={75--92}, year={2011}, pdf = {https://indianstrategicknowledgeonline.com/web/1308129610.pdf}, note = {synthèse assez complète de la vision du concept de cyberwarfare dans les années 2010} } @article{thompson2020threat, title={Threat hunting}, author={Thompson, Eric C and Thompson, Eric C}, journal={Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events}, pages={205--212}, year={2020}, publisher={Springer}, pdf = {https://link.springer.com/chapter/10.1007/978-1-4842-5608-4_7}, note = {article qui pose les base du threat hunting} } @comment {U} @comment {V} @comment {W} @article{warikoo2021triangle, title={The triangle model for cyber threat attribution}, author={Warikoo, Arun}, journal={Journal of Cyber Security Technology}, volume={5}, number={3-4}, pages={191--208}, year={2021}, publisher={Taylor \& Francis} } @comment {X} @comment {Y} @comment {Z}