%Nous rassemblon ici des articles fondateurs dans les domaines de la cybersécurité, de la cyberdéfense et de la lutte contre la manipulation numérique %merci d'utiliser le format ci-dessous pour saisir vos propositions %Here we bring together seminal articles in the fields of cybersecurity, cyber defence and the fight against digital manipulation %Please use the format below to enter your proposals @article{Johnson, author = {Edgar G. Johnson and Alfred O. Nier}, title = {Angular Aberrations in Sector Shaped Electromagnetic Lenses for Focusing Beams of Charged Particles}, journal = {Physical Review}, volume = {91}, number = {1}, month = {jul}, year = {1953} } ---------------------------------------------------------------------------------------------------------------------------------------------------------------- @comment {A} @comment {B} @article{bianco2013pyramid, title={The pyramid of pain}, author={Bianco, David}, journal={Enterprise Detection \& Response}, year={2013}, note = {Post fondateur ou l'auteur développe le concept de la pyramide of pain qui consiste à classer les artefacts en focntion de la difficulté à les détecter (pour le défenseur) ou à les mettre en ouevre (pour l'attaquant)}, url = {http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html} } @comment {C} @comment {D} @comment {E} @comment {F} @comment {G} @comment {H} @comment {I} @comment {J} @comment {K} @comment {L} @comment {M} @comment {N} @article{Nimmo2015anatomy, author = {Ben Nimmo}, title = {Anatomy of an info-war:how Russia's propaganda machine works, and how to counter it}, journal = {Central European Policy Institute}, number = {15}, year = {2015}, keywords = {désinformation, propagande, Russie, infowar}, note = {} } @comment {O} @comment {P} @comment {Q} @comment {R} @comment {S} @comment {T} @article{thompson2020threat, title={Threat hunting}, author={Thompson, Eric C and Thompson, Eric C}, journal={Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events}, pages={205--212}, year={2020}, publisher={Springer}, pdf = {https://link.springer.com/chapter/10.1007/978-1-4842-5608-4_7}, note = {article qui pose les base du threat hunting} } @comment {U} @comment {V} @comment {W} @article{warikoo2021triangle, title={The triangle model for cyber threat attribution}, author={Warikoo, Arun}, journal={Journal of Cyber Security Technology}, volume={5}, number={3-4}, pages={191--208}, year={2021}, publisher={Taylor \& Francis} } @comment {X} @comment {Y} @comment {Z}