Bibliography/Articles_essentiels.bib
2025-06-07 10:50:12 +02:00

388 строки
13 KiB
BibTeX
Исходник Постоянная ссылка Ответственный История

Этот файл содержит неоднозначные символы Юникода

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

%Nous rassemblons ici des articles fondateurs dans les domaines de la cybersécurité, de la cyberdéfense et de la lutte contre la manipulation numérique
%merci d'utiliser le format ci-dessous pour saisir vos propositions
%Here we bring together seminal articles in the fields of cybersecurity, cyber defence and the fight against digital manipulation
%Please use the format below to enter your proposals
@article{Johnson,
author = {Edgar G. Johnson and Alfred O. Nier},
title = {Angular Aberrations in Sector Shaped
Electromagnetic Lenses for Focusing Beams of Charged Particles},
journal = {Physical Review},
volume = {91},
number = {1},
month = {jul},
year = {1953}
}
----------------------------------------------------------------------------------------------------------------------------------------------------------------
@comment {A}
@comment {B}
@article{bianco2013pyramid,
title={The pyramid of pain},
author={Bianco, David},
journal={Enterprise Detection \& Response},
year={2013},
note = {Post fondateur ou l'auteur développe le concept de la pyramide of pain qui consiste à classer les artefacts en focntion de la difficulté à les détecter (pour le défenseur) ou à les mettre en ouevre (pour l'attaquant)},
url = {http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html}
}
@article{bouchaud2023browsing,
title={Browsing Amazon's Book Bubbles},
author={Bouchaud, Paul},
year={2023},
url={https://hal.science/hal-04308081},
keywords={Amazon, filter bubble, Collaborative Filtering}
}
@comment {C}
@article{cattaruzza2018enjeux,
title={Les enjeux de la num{\'e}risation du champ de bataille},
author={Cattaruzza, Ama{\"e}l and Taillat, St{\'e}phane},
journal={Dynamiques internationales},
number={13},
year={2018},
pdf={https://hal.science/hal-01811385/document}
}
@article{cartwright_economics_2023,
title = {The economics of ransomware attacks on integrated supply chain networks},
url = {https://www.scinapse.io/papers/4319921249},
doi = {10.1145/3579647},
abstract = {Anna Cartwright},
language = {en},
urldate = {2023-11-29},
journal = {Digital threats},
author = {Cartwright, Anna and Cartwright, Edward},
month = feb,
year = {2023},
}
@article{chavalarias2024can,
title={Can a single line of code change society? the systemic risks of optimizing engagement in recommender systems on global information flow, opinion dynamics and social structures},
author={Chavalarias, David and Bouchaud, Paul and Panahi, Maziyar},
journal={Journal of Artificial Societies and Social Simulation},
volume={27},
number={1},
pages={1--9},
year={2024},
publisher={Journal of Artificial Societies and Social Simulation}
}
@article{chavalarias2012societe,
title={La soci{\'e}t{\'e} recommand{\'e}e},
author={Chavalarias, David},
journal={Conflits des interpr{\'e}tations dans la soci{\'e}t{\'e} de l'information: thique et politique de l'environnement},
pages={26--39},
year={2012},
publisher={Lavoisier}
}
@comment {D}
@techreport{darcy2025lutter,
title={Lutter contre la d{\'e}sinformation: Penser autrement laction publique {\`a} l'aune des sciences cognitives},
author={Darcy, Gr{\'e}goire and Mercier, Hugo and Mari, Alda and Casati, Roberto},
year={2025},
institution={Center for Open Science},
url = {https://osf.io/preprints/osf/fu9cz_v1}
}
@article{douzet2020cyberespace,
title={Le cyberespace, {\c{c}}a sert, dabord, {\`a} faire la guerre. Prolif{\'e}ration, s{\'e}curit{\'e} et stabilit{\'e} du cyberespace},
author={Douzet, Fr{\'e}d{\'e}rick and G{\'e}ry, Aude},
journal={H{\'e}rodote},
number={2-3},
pages={329--350},
year={2020},
url = {https://www.cairn.info/revue-herodote-2020-2-page-329.htm},
publisher={Cairn/Cairn}
}
@article{douzet2020cartographier,
title={Cartographier la propagation des contenus russes et chinois sur le Web africain francophone},
author={Douzet, Fr{\'e}d{\'e}rick and Limonier, K{\'e}vin and Mihoubi, Selma and Ren{\'e}, {\'E}lodie},
journal={H{\'e}rodote},
number={2-3},
pages={77--99},
year={2020},
url = {https://www.cairn.info/revue-herodote-2020-2-page-77.htm},
publisher={Cairn/Cairn}
}
@article{douzet2018cyberespace,
title={Du cyberespace {\`a} la datasph{\`e}re. Le nouveau front pionnier de la g{\'e}ographie},
author={Douzet, Fr{\'e}d{\'e}rick and Desforges, Alix},
journal={Netcom. R{\'e}seaux, communication et territoires},
number={32-1/2},
pages={87--108},
year={2018},
keyword = {datasphère, cyberespace, révolution numérique, géopolitique, diplomatie},
url = {https://journals.openedition.org/netcom/3419},
publisher={Netcom Association}
}
@comment {E}
@comment {F}
@comment {G}
@article{glasze2023contested,
title={Contested spatialities of digital sovereignty},
author={Glasze, Georg and Cattaruzza, Ama{\"e}l and Douzet, Fr{\'e}d{\'e}rick and Dammann, Finn and Bertran, Marie-Gabrielle and B{\^o}mont, Clotilde and Braun, Matthias and Danet, Didier and Desforges, Alix and G{\'e}ry, Aude and others},
journal={Geopolitics},
volume={28},
number={2},
pages={919--958},
year={2023},
pdf = {https://www.tandfonline.com/doi/pdf/10.1080/14650045.2022.2050070},
publisher={Taylor \& Francis}
}
@article{gompert2014cyber,
title={Cyber warfare and Sino-American crisis instability},
author={Gompert, David C and Libicki, Martin},
journal={Survival},
volume={56},
number={4},
pages={7--22},
year={2014},
publisher={Taylor \& Francis},
keyword = {Stratégie, Chine, USA},
pdf = {https://www.tandfonline.com/doi/pdf/10.1080/00396338.2014.941543}
}
@article{grelot2021automation,
title={Automation of Binary Analysis: From Open Source Collection to Threat Intelligence},
author={Grelot, Frederic and Larinier, Sebastien and Salmon, Marie},
journal={Proceedings of the 28th C\&ESAR},
volume={41},
year={2021},
publisher={CEUR-WS Aachen, Germany},
pdf = {https://www.researchgate.net/profile/Marie-Salmon-2/publication/365361058_Automation_of_Binary_Analysis_From_Open_Source_Collection_to_Threat_Intelligence/links/6371fe4837878b3e87ad6e41/Automation-of-Binary-Analysis-From-Open-Source-Collection-to-Threat-Intelligence.pdf}
}
@comment {H}
@article{hanford2014cold,
title={The Cold War of Cyber Espionage},
author={Hanford, Elizabeth},
journal={Pub. Int. L. Rep.},
volume={20},
pages={22},
year={2014},
publisher={HeinOnline},
pdf = {https://lawecommons.luc.edu/cgi/viewcontent.cgi?article=1214&context=pilr}
}
@article{howard2018ira,
title={The IRA, social media and political polarization in the United States, 2012-2018},
author={Howard, Philip N and Ganesh, Bharath and Liotsiou, Dimitra and Kelly, John and Fran{\c{c}}ois, Camille},
year={2018},
publisher={Project on Computational Propaganda},
url={https://research.rug.nl/en/publications/the-ira-social-media-and-political-polarization-in-the-united-sta}
}
@comment {I}
@comment {J}
@comment {K}
@article{kok2020cyber,
title={Cyber Threat Prediction with Machine Learning},
author={Kok, Arvid and Mestric, Ivana Ilic and Valiyev, Giavid and Street, Michael},
journal={Information \& Security},
volume={47},
number={2},
pages={203--220},
year={2020},
publisher={ProCon Ltd.},
pdf = {https://connections-qj.org/system/files/4714_cyber_threat_assessment.pdf}
}
@comment {L}
@article{li_comprehensive_2021,
title={A comprehensive review study of cyber-attacks and cyber security; {Emerging} trends and recent developments},
author={Li, Yuchong and Liu, Qinghui},
journal={Energy Reports},
volume={7},
issn = {2352-4847},
url = {https://www.sciencedirect.com/science/article/pii/S2352484721007289},
doi = {10.1016/j.egyr.2021.08.126},
year={2021},
note = {Une revue de littérature définissant les concepts clés de la cyberdéfense (cyberattaque, cybersécurité, etc.)}
}
@article{libicki2012cyberspace,
title={Cyberspace is not a warfighting domain},
author={Libicki, Martin C},
journal={Isjlp},
volume={8},
pages={321},
year={2012},
publisher={HeinOnline},
note = {Au-delà du titre provocateur cet article est essentiel à la compréhension de la pensée stratégique américaine sur le cyberespace. L'auteur y développe un concept original pour mieux appréhender l'action dans le cyberespace et ne pas en faire un simple "domaine" de confrontation supplèmentaire.},
pdf = {https://kb.osu.edu/server/api/core/bitstreams/0f5c21be-28f3-5951-926c-6bdcab243319/content},
keyword = {stratégie, cyberwarfare, cyberdéfense, USA}
}
@article{libicki2015cyber,
title={The cyber war that wasnt},
author={Libicki, Martin and Geers, Kenneth},
journal={Cyber war in perspective: Russian aggression against Ukraine},
pages={49--54},
year={2015},
publisher={NATO Cyber Center of Excellence, NATO CCD COE Tallinn, Estonia},
pdf = {https://ccdcoe.org/uploads/2018/10/Ch05_CyberWarinPerspective_Libicki.pdf}
}
@comment {M}
@comment {N}
@article{Nimmo2015anatomy,
author = {Ben Nimmo},
title = {Anatomy of an info-war:how Russia's propaganda machine works, and how to counter it},
journal = {Central European Policy Institute},
number = {15},
year = {2015},
keywords = {désinformation, propagande, Russie, infowar},
note = {}
}
@comment {O}
@article{oruc2022assessing,
title={Assessing cyber risks of an INS using the MITRE ATT\&CK framework},
author={Oruc, Aybars and Amro, Ahmed and Gkioulos, Vasileios},
journal={Sensors},
volume={22},
number={22},
pages={8745},
year={2022},
publisher={MDPI},
note = {Article utile pour ceux qui travaillent dans la cybersécurité maritime},
keyword = {navigation, MITRE ATT\&CK, marine}
}
@inproceedings{ozkan2023zero,
title={Zero-Day Operational Cyber Readiness},
author={{\"O}zkan, Bar{\i}{\c{s}} Egemen and Tolga, {\.I}hsan B},
booktitle={2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)},
pages={199--215},
year={2023},
organization={IEEE},
note = {Publication de la célébre conf CyCon qui présente le concept de Zero-Day Readiness pour faire face aux défis de la connectivité permanente},
pdf = {https://ieeexplore.ieee.org/abstract/document/10181814}
}
@comment {P}
@comment {Q}
@comment {R}
@article{raad2024protecting,
title={Protecting freedom of thought: mitigating technological enablers of disinformation},
author={Raad, Alexa},
year={2024},
pdf={https://apo.org.au/sites/default/files/resource-files/2024-01/apo-nid325403.pdf},
publisher={Centre for International Governance Innovation}
}
@comment {S}
@comment {T}
@article{tabansky2011basic,
title={Basic concepts in cyber warfare},
author={Tabansky, Lior},
journal={Military and Strategic Affairs},
volume={3},
number={1},
pages={75--92},
year={2011},
pdf = {https://indianstrategicknowledgeonline.com/web/1308129610.pdf},
note = {synthèse assez complète de la vision du concept de cyberwarfare dans les années 2010}
}
@article{thompson2020threat,
title={Threat hunting},
author={Thompson, Eric C and Thompson, Eric C},
journal={Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events},
pages={205--212},
year={2020},
publisher={Springer},
pdf = {https://link.springer.com/chapter/10.1007/978-1-4842-5608-4_7},
note = {article qui pose les base du threat hunting}
}
@article{tor2017cumulative,
title={Cumulative deterrenceas a new paradigm for cyber deterrence},
author={Tor, Uri},
journal={Journal of Strategic Studies},
volume={40},
number={1-2},
pages={92--117},
year={2017},
url={https://www.tandfonline.com/doi/abs/10.1080/01402390.2015.1115975},
publisher={Taylor \& Francis}
}
@article{article,
author = {Turunen, Maija and Kari, Martti},
year = {2022},
month = {03},
pages = {433-439},
title = {Cumulative Cyber Deterrence},
volume = {17},
journal = {International Conference on Cyber Warfare and Security},
doi = {10.34190/iccws.17.1.55}
}
@comment {U}
@comment {V}
@article{vosoughi_spread_2018,
title = {The spread of true and false news online},
volume = {359},
issn = {0036-8075, 1095-9203},
url = {https://www.science.org/doi/10.1126/science.aap9559},
doi = {10.1126/science.aap9559},
language = {en},
number = {6380},
urldate = {2023-11-03},
journal = {Science},
author = {Vosoughi, Soroush and Roy, Deb and Aral, Sinan},
month = {mar},
year = {2018},
pages = {1146--1151},
file = {Vosoughi et al. - 2018 - The spread of true and false news online.pdf:files/3731/Vosoughi et al. - 2018 - The spread of true and false news online.pdf:application/pdf},
}
@article{vemprala2021Debunk,
title = {Debunking Misinformation Using a Game Theoretic Approach},
author = {Vemprala, Naga and Gudigantala, Naveen and Chaganti, Raj},
year = {2021},
moth = {06},
journal = {Emergent Research Forum (ERF)}
}
@comment {W}
@article{warikoo2021triangle,
title={The triangle model for cyber threat attribution},
author={Warikoo, Arun},
journal={Journal of Cyber Security Technology},
volume={5},
number={3-4},
pages={191--208},
year={2021},
publisher={Taylor \& Francis}
}
@comment {X}
@comment {Y}
@comment {Z}