%Nous rassemblon ici des articles fondateurs dans les domaines de la cybersécurité, de la cyberdéfense et de la lutte contre la manipulation numérique %merci d'utiliser le format ci-dessous pour saisir vos propositions %Here we bring together seminal articles in the fields of cybersecurity, cyber defence and the fight against digital manipulation %Please use the format below to enter your proposals @article{Johnson, author = {Edgar G. Johnson and Alfred O. Nier}, title = {Angular Aberrations in Sector Shaped Electromagnetic Lenses for Focusing Beams of Charged Particles}, journal = {Physical Review}, volume = {91}, number = {1}, month = {jul}, year = {1953} } ---------------------------------------------------------------------------------------------------------------------------------------------------------------- @comment {A} @comment {B} @article{bianco2013pyramid, title={The pyramid of pain}, author={Bianco, David}, journal={Enterprise Detection \& Response}, year={2013}, note = {Post fondateur ou l'auteur développe le concept de la pyramide of pain qui consiste à classer les artefacts en focntion de la difficulté à les détecter (pour le défenseur) ou à les mettre en ouevre (pour l'attaquant)}, url = {http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html} } @comment {C} @comment {D} @article{douzet2020cyberespace, title={Le cyberespace, {\c{c}}a sert, d’abord, {\`a} faire la guerre. Prolif{\'e}ration, s{\'e}curit{\'e} et stabilit{\'e} du cyberespace}, author={Douzet, Fr{\'e}d{\'e}rick and G{\'e}ry, Aude}, journal={H{\'e}rodote}, number={2-3}, pages={329--350}, year={2020}, url = {https://www.cairn.info/revue-herodote-2020-2-page-329.htm}, publisher={Cairn/Cairn} } @article{douzet2020cartographier, title={Cartographier la propagation des contenus russes et chinois sur le Web africain francophone}, author={Douzet, Fr{\'e}d{\'e}rick and Limonier, K{\'e}vin and Mihoubi, Selma and Ren{\'e}, {\'E}lodie}, journal={H{\'e}rodote}, number={2-3}, pages={77--99}, year={2020}, url = {https://www.cairn.info/revue-herodote-2020-2-page-77.htm}, publisher={Cairn/Cairn} } @article{douzet2018cyberespace, title={Du cyberespace {\`a} la datasph{\`e}re. Le nouveau front pionnier de la g{\'e}ographie}, author={Douzet, Fr{\'e}d{\'e}rick and Desforges, Alix}, journal={Netcom. R{\'e}seaux, communication et territoires}, number={32-1/2}, pages={87--108}, year={2018}, keyword = {datasphère, cyberespace, révolution numérique, géopolitique, diplomatie}, url = {https://journals.openedition.org/netcom/3419} publisher={Netcom Association} } @comment {E} @comment {F} @comment {G} @article{glasze2023contested, title={Contested spatialities of digital sovereignty}, author={Glasze, Georg and Cattaruzza, Ama{\"e}l and Douzet, Fr{\'e}d{\'e}rick and Dammann, Finn and Bertran, Marie-Gabrielle and B{\^o}mont, Clotilde and Braun, Matthias and Danet, Didier and Desforges, Alix and G{\'e}ry, Aude and others}, journal={Geopolitics}, volume={28}, number={2}, pages={919--958}, year={2023}, pdf = {https://www.tandfonline.com/doi/pdf/10.1080/14650045.2022.2050070}, publisher={Taylor \& Francis} } @article{gompert2014cyber, title={Cyber warfare and Sino-American crisis instability}, author={Gompert, David C and Libicki, Martin}, journal={Survival}, volume={56}, number={4}, pages={7--22}, year={2014}, publisher={Taylor \& Francis}, keyword = {Stratégie, Chine, USA}, pdf = {https://www.tandfonline.com/doi/pdf/10.1080/00396338.2014.941543} } @article{grelot2021automation, title={Automation of Binary Analysis: From Open Source Collection to Threat Intelligence}, author={Grelot, Frederic and Larinier, Sebastien and Salmon, Marie}, journal={Proceedings of the 28th C\&ESAR}, volume={41}, year={2021}, publisher={CEUR-WS Aachen, Germany}, pdf = {https://www.researchgate.net/profile/Marie-Salmon-2/publication/365361058_Automation_of_Binary_Analysis_From_Open_Source_Collection_to_Threat_Intelligence/links/6371fe4837878b3e87ad6e41/Automation-of-Binary-Analysis-From-Open-Source-Collection-to-Threat-Intelligence.pdf} } @comment {H} @comment {I} @comment {J} @comment {K} @article{kok2020cyber, title={Cyber Threat Prediction with Machine Learning}, author={Kok, Arvid and Mestric, Ivana Ilic and Valiyev, Giavid and Street, Michael}, journal={Information \& Security}, volume={47}, number={2}, pages={203--220}, year={2020}, publisher={ProCon Ltd.}, pdf = {https://connections-qj.org/system/files/4714_cyber_threat_assessment.pdf} } @comment {L} @article{libicki2012cyberspace, title={Cyberspace is not a warfighting domain}, author={Libicki, Martin C}, journal={Isjlp}, volume={8}, pages={321}, year={2012}, publisher={HeinOnline}, note = {Au-delà du titre provocateur cet article est essentiel à la compréhension de la pensée stratégique américaine sur le cyberespace. L'auteur y développe un concept original pour mieux appréhender l'action dans le cyberespace et ne pas en faire un simple "domaine" de confrontation supplèmentaire.}, pdf = {https://kb.osu.edu/server/api/core/bitstreams/0f5c21be-28f3-5951-926c-6bdcab243319/content}, keyword = {stratégie, cyberwarfare, cyberdéfense, USA} } @article{libicki2015cyber, title={The cyber war that wasn’t}, author={Libicki, Martin and Geers, Kenneth}, journal={Cyber war in perspective: Russian aggression against Ukraine}, pages={49--54}, year={2015}, publisher={NATO Cyber Center of Excellence, NATO CCD COE Tallinn, Estonia}, pdf = {https://ccdcoe.org/uploads/2018/10/Ch05_CyberWarinPerspective_Libicki.pdf} } @comment {M} @comment {N} @article{Nimmo2015anatomy, author = {Ben Nimmo}, title = {Anatomy of an info-war:how Russia's propaganda machine works, and how to counter it}, journal = {Central European Policy Institute}, number = {15}, year = {2015}, keywords = {désinformation, propagande, Russie, infowar}, note = {} } @comment {O} @article{oruc2022assessing, title={Assessing cyber risks of an INS using the MITRE ATT\&CK framework}, author={Oruc, Aybars and Amro, Ahmed and Gkioulos, Vasileios}, journal={Sensors}, volume={22}, number={22}, pages={8745}, year={2022}, publisher={MDPI}, note = {Article utile pour ceux qui travaillent dans la cybersécurité maritime}, keyword = {navigation, MITRE ATT\&CK, marine} } @inproceedings{ozkan2023zero, title={Zero-Day Operational Cyber Readiness}, author={{\"O}zkan, Bar{\i}{\c{s}} Egemen and Tolga, {\.I}hsan B}, booktitle={2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)}, pages={199--215}, year={2023}, organization={IEEE}, note = {Publication de la célébre conf CyCon qui présente le concept de Zero-Day Readiness pour faire face aux défis de la connectivité permanente}, pdf = {https://ieeexplore.ieee.org/abstract/document/10181814} } @comment {P} @comment {Q} @comment {R} @comment {S} @comment {T} @article{tabansky2011basic, title={Basic concepts in cyber warfare}, author={Tabansky, Lior}, journal={Military and Strategic Affairs}, volume={3}, number={1}, pages={75--92}, year={2011}, pdf = {https://indianstrategicknowledgeonline.com/web/1308129610.pdf}, note = {synthèse assez complète de la vision du concept de cyberwarfare dans les années 2010} } @article{thompson2020threat, title={Threat hunting}, author={Thompson, Eric C and Thompson, Eric C}, journal={Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events}, pages={205--212}, year={2020}, publisher={Springer}, pdf = {https://link.springer.com/chapter/10.1007/978-1-4842-5608-4_7}, note = {article qui pose les base du threat hunting} } @comment {U} @comment {V} @article{vosoughi_spread_2018, title = {The spread of true and false news online}, volume = {359}, issn = {0036-8075, 1095-9203}, url = {https://www.science.org/doi/10.1126/science.aap9559}, doi = {10.1126/science.aap9559}, language = {en}, number = {6380}, urldate = {2023-11-03}, journal = {Science}, author = {Vosoughi, Soroush and Roy, Deb and Aral, Sinan}, month = {mar}, year = {2018}, pages = {1146--1151}, file = {Vosoughi et al. - 2018 - The spread of true and false news online.pdf:files/3731/Vosoughi et al. - 2018 - The spread of true and false news online.pdf:application/pdf}, } @comment {W} @article{warikoo2021triangle, title={The triangle model for cyber threat attribution}, author={Warikoo, Arun}, journal={Journal of Cyber Security Technology}, volume={5}, number={3-4}, pages={191--208}, year={2021}, publisher={Taylor \& Francis} } @comment {X} @comment {Y} @comment {Z}