зеркало из
https://github.com/M82-project/Bibliography.git
synced 2025-10-28 20:54:16 +02:00
388 строки
13 KiB
BibTeX
388 строки
13 KiB
BibTeX
%Nous rassemblons ici des articles fondateurs dans les domaines de la cybersécurité, de la cyberdéfense et de la lutte contre la manipulation numérique
|
||
%merci d'utiliser le format ci-dessous pour saisir vos propositions
|
||
|
||
%Here we bring together seminal articles in the fields of cybersecurity, cyber defence and the fight against digital manipulation
|
||
%Please use the format below to enter your proposals
|
||
|
||
@article{Johnson,
|
||
author = {Edgar G. Johnson and Alfred O. Nier},
|
||
title = {Angular Aberrations in Sector Shaped
|
||
Electromagnetic Lenses for Focusing Beams of Charged Particles},
|
||
journal = {Physical Review},
|
||
volume = {91},
|
||
number = {1},
|
||
month = {jul},
|
||
year = {1953}
|
||
}
|
||
|
||
----------------------------------------------------------------------------------------------------------------------------------------------------------------
|
||
@comment {A}
|
||
@comment {B}
|
||
|
||
@article{bianco2013pyramid,
|
||
title={The pyramid of pain},
|
||
author={Bianco, David},
|
||
journal={Enterprise Detection \& Response},
|
||
year={2013},
|
||
note = {Post fondateur ou l'auteur développe le concept de la pyramide of pain qui consiste à classer les artefacts en focntion de la difficulté à les détecter (pour le défenseur) ou à les mettre en ouevre (pour l'attaquant)},
|
||
url = {http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html}
|
||
}
|
||
|
||
@article{bouchaud2023browsing,
|
||
title={Browsing Amazon's Book Bubbles},
|
||
author={Bouchaud, Paul},
|
||
year={2023},
|
||
url={https://hal.science/hal-04308081},
|
||
keywords={Amazon, filter bubble, Collaborative Filtering}
|
||
}
|
||
|
||
@comment {C}
|
||
|
||
@article{cattaruzza2018enjeux,
|
||
title={Les enjeux de la num{\'e}risation du champ de bataille},
|
||
author={Cattaruzza, Ama{\"e}l and Taillat, St{\'e}phane},
|
||
journal={Dynamiques internationales},
|
||
number={13},
|
||
year={2018},
|
||
pdf={https://hal.science/hal-01811385/document}
|
||
}
|
||
@article{cartwright_economics_2023,
|
||
title = {The economics of ransomware attacks on integrated supply chain networks},
|
||
url = {https://www.scinapse.io/papers/4319921249},
|
||
doi = {10.1145/3579647},
|
||
abstract = {Anna Cartwright},
|
||
language = {en},
|
||
urldate = {2023-11-29},
|
||
journal = {Digital threats},
|
||
author = {Cartwright, Anna and Cartwright, Edward},
|
||
month = feb,
|
||
year = {2023},
|
||
}
|
||
|
||
@article{chavalarias2024can,
|
||
title={Can a single line of code change society? the systemic risks of optimizing engagement in recommender systems on global information flow, opinion dynamics and social structures},
|
||
author={Chavalarias, David and Bouchaud, Paul and Panahi, Maziyar},
|
||
journal={Journal of Artificial Societies and Social Simulation},
|
||
volume={27},
|
||
number={1},
|
||
pages={1--9},
|
||
year={2024},
|
||
publisher={Journal of Artificial Societies and Social Simulation}
|
||
}
|
||
|
||
@article{chavalarias2012societe,
|
||
title={La soci{\'e}t{\'e} recommand{\'e}e},
|
||
author={Chavalarias, David},
|
||
journal={Conflits des interpr{\'e}tations dans la soci{\'e}t{\'e} de l'information: thique et politique de l'environnement},
|
||
pages={26--39},
|
||
year={2012},
|
||
publisher={Lavoisier}
|
||
}
|
||
|
||
|
||
@comment {D}
|
||
|
||
@techreport{darcy2025lutter,
|
||
title={Lutter contre la d{\'e}sinformation: Penser autrement l’action publique {\`a} l'aune des sciences cognitives},
|
||
author={Darcy, Gr{\'e}goire and Mercier, Hugo and Mari, Alda and Casati, Roberto},
|
||
year={2025},
|
||
institution={Center for Open Science},
|
||
url = {https://osf.io/preprints/osf/fu9cz_v1}
|
||
}
|
||
|
||
@article{douzet2020cyberespace,
|
||
title={Le cyberespace, {\c{c}}a sert, d’abord, {\`a} faire la guerre. Prolif{\'e}ration, s{\'e}curit{\'e} et stabilit{\'e} du cyberespace},
|
||
author={Douzet, Fr{\'e}d{\'e}rick and G{\'e}ry, Aude},
|
||
journal={H{\'e}rodote},
|
||
number={2-3},
|
||
pages={329--350},
|
||
year={2020},
|
||
url = {https://www.cairn.info/revue-herodote-2020-2-page-329.htm},
|
||
publisher={Cairn/Cairn}
|
||
}
|
||
|
||
@article{douzet2020cartographier,
|
||
title={Cartographier la propagation des contenus russes et chinois sur le Web africain francophone},
|
||
author={Douzet, Fr{\'e}d{\'e}rick and Limonier, K{\'e}vin and Mihoubi, Selma and Ren{\'e}, {\'E}lodie},
|
||
journal={H{\'e}rodote},
|
||
number={2-3},
|
||
pages={77--99},
|
||
year={2020},
|
||
url = {https://www.cairn.info/revue-herodote-2020-2-page-77.htm},
|
||
publisher={Cairn/Cairn}
|
||
}
|
||
|
||
@article{douzet2018cyberespace,
|
||
title={Du cyberespace {\`a} la datasph{\`e}re. Le nouveau front pionnier de la g{\'e}ographie},
|
||
author={Douzet, Fr{\'e}d{\'e}rick and Desforges, Alix},
|
||
journal={Netcom. R{\'e}seaux, communication et territoires},
|
||
number={32-1/2},
|
||
pages={87--108},
|
||
year={2018},
|
||
keyword = {datasphère, cyberespace, révolution numérique, géopolitique, diplomatie},
|
||
url = {https://journals.openedition.org/netcom/3419},
|
||
publisher={Netcom Association}
|
||
}
|
||
|
||
|
||
@comment {E}
|
||
@comment {F}
|
||
@comment {G}
|
||
|
||
@article{glasze2023contested,
|
||
title={Contested spatialities of digital sovereignty},
|
||
author={Glasze, Georg and Cattaruzza, Ama{\"e}l and Douzet, Fr{\'e}d{\'e}rick and Dammann, Finn and Bertran, Marie-Gabrielle and B{\^o}mont, Clotilde and Braun, Matthias and Danet, Didier and Desforges, Alix and G{\'e}ry, Aude and others},
|
||
journal={Geopolitics},
|
||
volume={28},
|
||
number={2},
|
||
pages={919--958},
|
||
year={2023},
|
||
pdf = {https://www.tandfonline.com/doi/pdf/10.1080/14650045.2022.2050070},
|
||
publisher={Taylor \& Francis}
|
||
}
|
||
|
||
@article{gompert2014cyber,
|
||
title={Cyber warfare and Sino-American crisis instability},
|
||
author={Gompert, David C and Libicki, Martin},
|
||
journal={Survival},
|
||
volume={56},
|
||
number={4},
|
||
pages={7--22},
|
||
year={2014},
|
||
publisher={Taylor \& Francis},
|
||
keyword = {Stratégie, Chine, USA},
|
||
pdf = {https://www.tandfonline.com/doi/pdf/10.1080/00396338.2014.941543}
|
||
}
|
||
|
||
@article{grelot2021automation,
|
||
title={Automation of Binary Analysis: From Open Source Collection to Threat Intelligence},
|
||
author={Grelot, Frederic and Larinier, Sebastien and Salmon, Marie},
|
||
journal={Proceedings of the 28th C\&ESAR},
|
||
volume={41},
|
||
year={2021},
|
||
publisher={CEUR-WS Aachen, Germany},
|
||
pdf = {https://www.researchgate.net/profile/Marie-Salmon-2/publication/365361058_Automation_of_Binary_Analysis_From_Open_Source_Collection_to_Threat_Intelligence/links/6371fe4837878b3e87ad6e41/Automation-of-Binary-Analysis-From-Open-Source-Collection-to-Threat-Intelligence.pdf}
|
||
}
|
||
|
||
@comment {H}
|
||
|
||
@article{hanford2014cold,
|
||
title={The Cold War of Cyber Espionage},
|
||
author={Hanford, Elizabeth},
|
||
journal={Pub. Int. L. Rep.},
|
||
volume={20},
|
||
pages={22},
|
||
year={2014},
|
||
publisher={HeinOnline},
|
||
pdf = {https://lawecommons.luc.edu/cgi/viewcontent.cgi?article=1214&context=pilr}
|
||
}
|
||
|
||
@article{howard2018ira,
|
||
title={The IRA, social media and political polarization in the United States, 2012-2018},
|
||
author={Howard, Philip N and Ganesh, Bharath and Liotsiou, Dimitra and Kelly, John and Fran{\c{c}}ois, Camille},
|
||
year={2018},
|
||
publisher={Project on Computational Propaganda},
|
||
url={https://research.rug.nl/en/publications/the-ira-social-media-and-political-polarization-in-the-united-sta}
|
||
}
|
||
|
||
@comment {I}
|
||
@comment {J}
|
||
@comment {K}
|
||
|
||
@article{kok2020cyber,
|
||
title={Cyber Threat Prediction with Machine Learning},
|
||
author={Kok, Arvid and Mestric, Ivana Ilic and Valiyev, Giavid and Street, Michael},
|
||
journal={Information \& Security},
|
||
volume={47},
|
||
number={2},
|
||
pages={203--220},
|
||
year={2020},
|
||
publisher={ProCon Ltd.},
|
||
pdf = {https://connections-qj.org/system/files/4714_cyber_threat_assessment.pdf}
|
||
}
|
||
|
||
@comment {L}
|
||
|
||
@article{li_comprehensive_2021,
|
||
title={A comprehensive review study of cyber-attacks and cyber security; {Emerging} trends and recent developments},
|
||
author={Li, Yuchong and Liu, Qinghui},
|
||
journal={Energy Reports},
|
||
volume={7},
|
||
issn = {2352-4847},
|
||
url = {https://www.sciencedirect.com/science/article/pii/S2352484721007289},
|
||
doi = {10.1016/j.egyr.2021.08.126},
|
||
year={2021},
|
||
note = {Une revue de littérature définissant les concepts clés de la cyberdéfense (cyberattaque, cybersécurité, etc.)}
|
||
}
|
||
|
||
@article{libicki2012cyberspace,
|
||
title={Cyberspace is not a warfighting domain},
|
||
author={Libicki, Martin C},
|
||
journal={Isjlp},
|
||
volume={8},
|
||
pages={321},
|
||
year={2012},
|
||
publisher={HeinOnline},
|
||
note = {Au-delà du titre provocateur cet article est essentiel à la compréhension de la pensée stratégique américaine sur le cyberespace. L'auteur y développe un concept original pour mieux appréhender l'action dans le cyberespace et ne pas en faire un simple "domaine" de confrontation supplèmentaire.},
|
||
pdf = {https://kb.osu.edu/server/api/core/bitstreams/0f5c21be-28f3-5951-926c-6bdcab243319/content},
|
||
keyword = {stratégie, cyberwarfare, cyberdéfense, USA}
|
||
}
|
||
|
||
@article{libicki2015cyber,
|
||
title={The cyber war that wasn’t},
|
||
author={Libicki, Martin and Geers, Kenneth},
|
||
journal={Cyber war in perspective: Russian aggression against Ukraine},
|
||
pages={49--54},
|
||
year={2015},
|
||
publisher={NATO Cyber Center of Excellence, NATO CCD COE Tallinn, Estonia},
|
||
pdf = {https://ccdcoe.org/uploads/2018/10/Ch05_CyberWarinPerspective_Libicki.pdf}
|
||
}
|
||
|
||
@comment {M}
|
||
@comment {N}
|
||
|
||
@article{Nimmo2015anatomy,
|
||
author = {Ben Nimmo},
|
||
title = {Anatomy of an info-war:how Russia's propaganda machine works, and how to counter it},
|
||
journal = {Central European Policy Institute},
|
||
number = {15},
|
||
year = {2015},
|
||
keywords = {désinformation, propagande, Russie, infowar},
|
||
note = {}
|
||
}
|
||
|
||
@comment {O}
|
||
|
||
@article{oruc2022assessing,
|
||
title={Assessing cyber risks of an INS using the MITRE ATT\&CK framework},
|
||
author={Oruc, Aybars and Amro, Ahmed and Gkioulos, Vasileios},
|
||
journal={Sensors},
|
||
volume={22},
|
||
number={22},
|
||
pages={8745},
|
||
year={2022},
|
||
publisher={MDPI},
|
||
note = {Article utile pour ceux qui travaillent dans la cybersécurité maritime},
|
||
keyword = {navigation, MITRE ATT\&CK, marine}
|
||
}
|
||
|
||
@inproceedings{ozkan2023zero,
|
||
title={Zero-Day Operational Cyber Readiness},
|
||
author={{\"O}zkan, Bar{\i}{\c{s}} Egemen and Tolga, {\.I}hsan B},
|
||
booktitle={2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)},
|
||
pages={199--215},
|
||
year={2023},
|
||
organization={IEEE},
|
||
note = {Publication de la célébre conf CyCon qui présente le concept de Zero-Day Readiness pour faire face aux défis de la connectivité permanente},
|
||
pdf = {https://ieeexplore.ieee.org/abstract/document/10181814}
|
||
}
|
||
|
||
@comment {P}
|
||
@comment {Q}
|
||
@comment {R}
|
||
|
||
@article{raad2024protecting,
|
||
title={Protecting freedom of thought: mitigating technological enablers of disinformation},
|
||
author={Raad, Alexa},
|
||
year={2024},
|
||
pdf={https://apo.org.au/sites/default/files/resource-files/2024-01/apo-nid325403.pdf},
|
||
publisher={Centre for International Governance Innovation}
|
||
}
|
||
|
||
@comment {S}
|
||
@comment {T}
|
||
|
||
@article{tabansky2011basic,
|
||
title={Basic concepts in cyber warfare},
|
||
author={Tabansky, Lior},
|
||
journal={Military and Strategic Affairs},
|
||
volume={3},
|
||
number={1},
|
||
pages={75--92},
|
||
year={2011},
|
||
pdf = {https://indianstrategicknowledgeonline.com/web/1308129610.pdf},
|
||
note = {synthèse assez complète de la vision du concept de cyberwarfare dans les années 2010}
|
||
}
|
||
|
||
@article{thompson2020threat,
|
||
title={Threat hunting},
|
||
author={Thompson, Eric C and Thompson, Eric C},
|
||
journal={Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events},
|
||
pages={205--212},
|
||
year={2020},
|
||
publisher={Springer},
|
||
pdf = {https://link.springer.com/chapter/10.1007/978-1-4842-5608-4_7},
|
||
note = {article qui pose les base du threat hunting}
|
||
}
|
||
|
||
@article{tor2017cumulative,
|
||
title={‘Cumulative deterrence’as a new paradigm for cyber deterrence},
|
||
author={Tor, Uri},
|
||
journal={Journal of Strategic Studies},
|
||
volume={40},
|
||
number={1-2},
|
||
pages={92--117},
|
||
year={2017},
|
||
url={https://www.tandfonline.com/doi/abs/10.1080/01402390.2015.1115975},
|
||
publisher={Taylor \& Francis}
|
||
}
|
||
|
||
@article{article,
|
||
author = {Turunen, Maija and Kari, Martti},
|
||
year = {2022},
|
||
month = {03},
|
||
pages = {433-439},
|
||
title = {Cumulative Cyber Deterrence},
|
||
volume = {17},
|
||
journal = {International Conference on Cyber Warfare and Security},
|
||
doi = {10.34190/iccws.17.1.55}
|
||
}
|
||
|
||
@comment {U}
|
||
|
||
@comment {V}
|
||
|
||
@article{vosoughi_spread_2018,
|
||
title = {The spread of true and false news online},
|
||
volume = {359},
|
||
issn = {0036-8075, 1095-9203},
|
||
url = {https://www.science.org/doi/10.1126/science.aap9559},
|
||
doi = {10.1126/science.aap9559},
|
||
language = {en},
|
||
number = {6380},
|
||
urldate = {2023-11-03},
|
||
journal = {Science},
|
||
author = {Vosoughi, Soroush and Roy, Deb and Aral, Sinan},
|
||
month = {mar},
|
||
year = {2018},
|
||
pages = {1146--1151},
|
||
file = {Vosoughi et al. - 2018 - The spread of true and false news online.pdf:files/3731/Vosoughi et al. - 2018 - The spread of true and false news online.pdf:application/pdf},
|
||
}
|
||
@article{vemprala2021Debunk,
|
||
title = {Debunking Misinformation Using a Game Theoretic Approach},
|
||
author = {Vemprala, Naga and Gudigantala, Naveen and Chaganti, Raj},
|
||
year = {2021},
|
||
moth = {06},
|
||
journal = {Emergent Research Forum (ERF)}
|
||
}
|
||
@comment {W}
|
||
|
||
@article{warikoo2021triangle,
|
||
title={The triangle model for cyber threat attribution},
|
||
author={Warikoo, Arun},
|
||
journal={Journal of Cyber Security Technology},
|
||
volume={5},
|
||
number={3-4},
|
||
pages={191--208},
|
||
year={2021},
|
||
publisher={Taylor \& Francis}
|
||
}
|
||
|
||
@comment {X}
|
||
@comment {Y}
|
||
|
||
@comment {Z}
|
||
|
||
|
||
|