зеркало из
				https://github.com/M82-project/Bibliography.git
				synced 2025-10-29 13:06:06 +02:00 
			
		
		
		
	
		
			
				
	
	
		
			361 строка
		
	
	
		
			12 KiB
		
	
	
	
		
			BibTeX
		
	
	
	
	
	
			
		
		
	
	
			361 строка
		
	
	
		
			12 KiB
		
	
	
	
		
			BibTeX
		
	
	
	
	
	
| %Nous rassemblons ici des articles fondateurs dans les domaines de la cybersécurité, de la cyberdéfense et de la lutte contre la manipulation numérique
 | ||
| %merci d'utiliser le format ci-dessous pour saisir vos propositions
 | ||
| 
 | ||
| %Here we bring together seminal articles in the fields of cybersecurity, cyber defence and the fight against digital manipulation 
 | ||
| %Please use the format below to enter your proposals
 | ||
| 
 | ||
| @article{Johnson,
 | ||
|         author = {Edgar G. Johnson and Alfred O. Nier},
 | ||
|         title = {Angular Aberrations in Sector Shaped 
 | ||
|         Electromagnetic Lenses for Focusing Beams of Charged Particles},
 | ||
|         journal = {Physical Review},
 | ||
|         volume = {91},
 | ||
|         number = {1},
 | ||
|         month = {jul},
 | ||
|         year = {1953}
 | ||
| }
 | ||
| 
 | ||
| ----------------------------------------------------------------------------------------------------------------------------------------------------------------
 | ||
| @comment {A}
 | ||
| @comment {B}
 | ||
| 
 | ||
| @article{bianco2013pyramid,
 | ||
|   title={The pyramid of pain},
 | ||
|   author={Bianco, David},
 | ||
|   journal={Enterprise Detection \& Response},
 | ||
|   year={2013},
 | ||
|   note = {Post fondateur ou l'auteur développe le concept de la pyramide of pain qui consiste à classer les artefacts en focntion de la difficulté à les détecter (pour le défenseur) ou à les mettre en ouevre (pour l'attaquant)},
 | ||
|   url = {http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html}
 | ||
| }
 | ||
| 
 | ||
| @article{bouchaud2023browsing,
 | ||
|   title={Browsing Amazon's Book Bubbles},
 | ||
|   author={Bouchaud, Paul},
 | ||
|   year={2023},
 | ||
|   url={https://hal.science/hal-04308081},
 | ||
|   keywords={Amazon, filter bubble, Collaborative Filtering}
 | ||
| }
 | ||
| 
 | ||
| @comment {C}
 | ||
| 
 | ||
| @article{cattaruzza2018enjeux,
 | ||
|   title={Les enjeux de la num{\'e}risation du champ de bataille},
 | ||
|   author={Cattaruzza, Ama{\"e}l and Taillat, St{\'e}phane},
 | ||
|   journal={Dynamiques internationales},
 | ||
|   number={13},
 | ||
|   year={2018},
 | ||
|   pdf={https://hal.science/hal-01811385/document}
 | ||
| }
 | ||
| @article{cartwright_economics_2023,
 | ||
|         title = {The economics of ransomware attacks on integrated supply chain networks},
 | ||
| 	url = {https://www.scinapse.io/papers/4319921249},
 | ||
| 	doi = {10.1145/3579647},
 | ||
| 	abstract = {Anna Cartwright},
 | ||
| 	language = {en},
 | ||
| 	urldate = {2023-11-29},
 | ||
| 	journal = {Digital threats},
 | ||
| 	author = {Cartwright, Anna and Cartwright, Edward},
 | ||
| 	month = feb,
 | ||
| 	year = {2023},
 | ||
| }
 | ||
| 
 | ||
| @article{chavalarias2024can,
 | ||
|   title={Can a single line of code change society? the systemic risks of optimizing engagement in recommender systems on global information flow, opinion dynamics and social structures},
 | ||
|   author={Chavalarias, David and Bouchaud, Paul and Panahi, Maziyar},
 | ||
|   journal={Journal of Artificial Societies and Social Simulation},
 | ||
|   volume={27},
 | ||
|   number={1},
 | ||
|   pages={1--9},
 | ||
|   year={2024},
 | ||
|   publisher={Journal of Artificial Societies and Social Simulation}
 | ||
| }
 | ||
| 
 | ||
| @comment {D}
 | ||
| 
 | ||
| @article{douzet2020cyberespace,
 | ||
|   title={Le cyberespace, {\c{c}}a sert, d’abord, {\`a} faire la guerre. Prolif{\'e}ration, s{\'e}curit{\'e} et stabilit{\'e} du cyberespace},
 | ||
|   author={Douzet, Fr{\'e}d{\'e}rick and G{\'e}ry, Aude},
 | ||
|   journal={H{\'e}rodote},
 | ||
|   number={2-3},
 | ||
|   pages={329--350},
 | ||
|   year={2020},
 | ||
|   url = {https://www.cairn.info/revue-herodote-2020-2-page-329.htm},
 | ||
|   publisher={Cairn/Cairn}
 | ||
| }
 | ||
| 
 | ||
| @article{douzet2020cartographier,
 | ||
|   title={Cartographier la propagation des contenus russes et chinois sur le Web africain francophone},
 | ||
|   author={Douzet, Fr{\'e}d{\'e}rick and Limonier, K{\'e}vin and Mihoubi, Selma and Ren{\'e}, {\'E}lodie},
 | ||
|   journal={H{\'e}rodote},
 | ||
|   number={2-3},
 | ||
|   pages={77--99},
 | ||
|   year={2020},
 | ||
|   url = {https://www.cairn.info/revue-herodote-2020-2-page-77.htm},
 | ||
|   publisher={Cairn/Cairn}
 | ||
| }
 | ||
| 
 | ||
| @article{douzet2018cyberespace,
 | ||
|   title={Du cyberespace {\`a} la datasph{\`e}re. Le nouveau front pionnier de la g{\'e}ographie},
 | ||
|   author={Douzet, Fr{\'e}d{\'e}rick and Desforges, Alix},
 | ||
|   journal={Netcom. R{\'e}seaux, communication et territoires},
 | ||
|   number={32-1/2},
 | ||
|   pages={87--108},
 | ||
|   year={2018},
 | ||
|   keyword = {datasphère, cyberespace, révolution numérique, géopolitique, diplomatie},
 | ||
|   url = {https://journals.openedition.org/netcom/3419},
 | ||
|   publisher={Netcom Association}
 | ||
| }
 | ||
| 
 | ||
| 
 | ||
| @comment {E}
 | ||
| @comment {F}
 | ||
| @comment {G}
 | ||
| 
 | ||
| @article{glasze2023contested,
 | ||
|   title={Contested spatialities of digital sovereignty},
 | ||
|   author={Glasze, Georg and Cattaruzza, Ama{\"e}l and Douzet, Fr{\'e}d{\'e}rick and Dammann, Finn and Bertran, Marie-Gabrielle and B{\^o}mont, Clotilde and Braun, Matthias and Danet, Didier and Desforges, Alix and G{\'e}ry, Aude and others},
 | ||
|   journal={Geopolitics},
 | ||
|   volume={28},
 | ||
|   number={2},
 | ||
|   pages={919--958},
 | ||
|   year={2023},
 | ||
|   pdf = {https://www.tandfonline.com/doi/pdf/10.1080/14650045.2022.2050070},
 | ||
|   publisher={Taylor \& Francis}
 | ||
| }
 | ||
| 
 | ||
| @article{gompert2014cyber,
 | ||
|   title={Cyber warfare and Sino-American crisis instability},
 | ||
|   author={Gompert, David C and Libicki, Martin},
 | ||
|   journal={Survival},
 | ||
|   volume={56},
 | ||
|   number={4},
 | ||
|   pages={7--22},
 | ||
|   year={2014},
 | ||
|   publisher={Taylor \& Francis},
 | ||
|   keyword = {Stratégie, Chine, USA},
 | ||
|   pdf = {https://www.tandfonline.com/doi/pdf/10.1080/00396338.2014.941543}
 | ||
| }
 | ||
| 
 | ||
| @article{grelot2021automation,
 | ||
|   title={Automation of Binary Analysis: From Open Source Collection to Threat Intelligence},
 | ||
|   author={Grelot, Frederic and Larinier, Sebastien and Salmon, Marie},
 | ||
|   journal={Proceedings of the 28th C\&ESAR},
 | ||
|   volume={41},
 | ||
|   year={2021},
 | ||
|   publisher={CEUR-WS Aachen, Germany},
 | ||
|   pdf = {https://www.researchgate.net/profile/Marie-Salmon-2/publication/365361058_Automation_of_Binary_Analysis_From_Open_Source_Collection_to_Threat_Intelligence/links/6371fe4837878b3e87ad6e41/Automation-of-Binary-Analysis-From-Open-Source-Collection-to-Threat-Intelligence.pdf}
 | ||
| }
 | ||
| 
 | ||
| @comment {H}
 | ||
| 
 | ||
| @article{hanford2014cold,
 | ||
|   title={The Cold War of Cyber Espionage},
 | ||
|   author={Hanford, Elizabeth},
 | ||
|   journal={Pub. Int. L. Rep.},
 | ||
|   volume={20},
 | ||
|   pages={22},
 | ||
|   year={2014},
 | ||
|   publisher={HeinOnline},
 | ||
|   pdf = {https://lawecommons.luc.edu/cgi/viewcontent.cgi?article=1214&context=pilr}
 | ||
| }
 | ||
| 
 | ||
| @article{howard2018ira,
 | ||
|   title={The IRA, social media and political polarization in the United States, 2012-2018},
 | ||
|   author={Howard, Philip N and Ganesh, Bharath and Liotsiou, Dimitra and Kelly, John and Fran{\c{c}}ois, Camille},
 | ||
|   year={2018},
 | ||
|   publisher={Project on Computational Propaganda},
 | ||
|   url={https://research.rug.nl/en/publications/the-ira-social-media-and-political-polarization-in-the-united-sta}
 | ||
| }
 | ||
| 
 | ||
| @comment {I}
 | ||
| @comment {J}
 | ||
| @comment {K}
 | ||
| 
 | ||
| @article{kok2020cyber,
 | ||
|   title={Cyber Threat Prediction with Machine Learning},
 | ||
|   author={Kok, Arvid and Mestric, Ivana Ilic and Valiyev, Giavid and Street, Michael},
 | ||
|   journal={Information \& Security},
 | ||
|   volume={47},
 | ||
|   number={2},
 | ||
|   pages={203--220},
 | ||
|   year={2020},
 | ||
|   publisher={ProCon Ltd.},
 | ||
|   pdf = {https://connections-qj.org/system/files/4714_cyber_threat_assessment.pdf}
 | ||
| }
 | ||
| 
 | ||
| @comment {L}
 | ||
| 
 | ||
| @article{li_comprehensive_2021,
 | ||
|   title={A comprehensive review study of cyber-attacks and cyber security; {Emerging} trends and recent developments},
 | ||
|   author={Li, Yuchong and Liu, Qinghui},
 | ||
|   journal={Energy Reports},
 | ||
|   volume={7},
 | ||
|   issn = {2352-4847},
 | ||
|   url = {https://www.sciencedirect.com/science/article/pii/S2352484721007289},
 | ||
|   doi = {10.1016/j.egyr.2021.08.126},
 | ||
|   year={2021},
 | ||
| note = {Une revue de littérature définissant les concepts clés de la cyberdéfense (cyberattaque, cybersécurité, etc.)}
 | ||
| }
 | ||
| 
 | ||
| @article{libicki2012cyberspace,
 | ||
|   title={Cyberspace is not a warfighting domain},
 | ||
|   author={Libicki, Martin C},
 | ||
|   journal={Isjlp},
 | ||
|   volume={8},
 | ||
|   pages={321},
 | ||
|   year={2012},
 | ||
|   publisher={HeinOnline},
 | ||
|   note = {Au-delà du titre provocateur cet article est essentiel à la compréhension de la pensée stratégique américaine sur le cyberespace. L'auteur y développe un concept original pour mieux appréhender l'action dans le cyberespace et ne pas en faire un simple "domaine" de confrontation supplèmentaire.},
 | ||
|   pdf = {https://kb.osu.edu/server/api/core/bitstreams/0f5c21be-28f3-5951-926c-6bdcab243319/content},
 | ||
|   keyword = {stratégie, cyberwarfare, cyberdéfense, USA}
 | ||
| }
 | ||
| 
 | ||
| @article{libicki2015cyber,
 | ||
|   title={The cyber war that wasn’t},
 | ||
|   author={Libicki, Martin and Geers, Kenneth},
 | ||
|   journal={Cyber war in perspective: Russian aggression against Ukraine},
 | ||
|   pages={49--54},
 | ||
|   year={2015},
 | ||
|   publisher={NATO Cyber Center of Excellence, NATO CCD COE Tallinn, Estonia},
 | ||
|   pdf = {https://ccdcoe.org/uploads/2018/10/Ch05_CyberWarinPerspective_Libicki.pdf}
 | ||
| }
 | ||
| 
 | ||
| @comment {M}
 | ||
| @comment {N}
 | ||
| 
 | ||
| @article{Nimmo2015anatomy,
 | ||
|         author = {Ben Nimmo},
 | ||
|         title = {Anatomy of an info-war:how Russia's propaganda machine works, and how to counter it},
 | ||
|         journal = {Central European Policy Institute},
 | ||
|         number = {15},
 | ||
|         year = {2015},
 | ||
|         keywords = {désinformation, propagande, Russie, infowar},
 | ||
|         note = {}
 | ||
| }
 | ||
| 
 | ||
| @comment {O}
 | ||
| 
 | ||
| @article{oruc2022assessing,
 | ||
|   title={Assessing cyber risks of an INS using the MITRE ATT\&CK framework},
 | ||
|   author={Oruc, Aybars and Amro, Ahmed and Gkioulos, Vasileios},
 | ||
|   journal={Sensors},
 | ||
|   volume={22},
 | ||
|   number={22},
 | ||
|   pages={8745},
 | ||
|   year={2022},
 | ||
|   publisher={MDPI},
 | ||
|   note = {Article utile pour ceux qui travaillent dans la cybersécurité maritime},
 | ||
|   keyword = {navigation, MITRE ATT\&CK, marine}
 | ||
| }
 | ||
| 
 | ||
| @inproceedings{ozkan2023zero,
 | ||
|   title={Zero-Day Operational Cyber Readiness},
 | ||
|   author={{\"O}zkan, Bar{\i}{\c{s}} Egemen and Tolga, {\.I}hsan B},
 | ||
|   booktitle={2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)},
 | ||
|   pages={199--215},
 | ||
|   year={2023},
 | ||
|   organization={IEEE},
 | ||
|   note = {Publication de la célébre conf CyCon qui présente le concept de Zero-Day Readiness pour faire face aux défis de la connectivité permanente},
 | ||
|   pdf = {https://ieeexplore.ieee.org/abstract/document/10181814}
 | ||
| }
 | ||
| 
 | ||
| @comment {P}
 | ||
| @comment {Q}
 | ||
| @comment {R}
 | ||
| @comment {S}
 | ||
| @comment {T}
 | ||
| 
 | ||
| @article{tabansky2011basic,
 | ||
|   title={Basic concepts in cyber warfare},
 | ||
|   author={Tabansky, Lior},
 | ||
|   journal={Military and Strategic Affairs},
 | ||
|   volume={3},
 | ||
|   number={1},
 | ||
|   pages={75--92},
 | ||
|   year={2011},
 | ||
|   pdf = {https://indianstrategicknowledgeonline.com/web/1308129610.pdf},
 | ||
|   note = {synthèse assez complète de la vision du concept de cyberwarfare dans les années 2010}
 | ||
| }
 | ||
| 
 | ||
| @article{thompson2020threat,
 | ||
|   title={Threat hunting},
 | ||
|   author={Thompson, Eric C and Thompson, Eric C},
 | ||
|   journal={Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events},
 | ||
|   pages={205--212},
 | ||
|   year={2020},
 | ||
|   publisher={Springer},
 | ||
|   pdf = {https://link.springer.com/chapter/10.1007/978-1-4842-5608-4_7},
 | ||
|   note = {article qui pose les base du threat hunting}
 | ||
| }
 | ||
| 
 | ||
| @article{tor2017cumulative,
 | ||
|   title={‘Cumulative deterrence’as a new paradigm for cyber deterrence},
 | ||
|   author={Tor, Uri},
 | ||
|   journal={Journal of Strategic Studies},
 | ||
|   volume={40},
 | ||
|   number={1-2},
 | ||
|   pages={92--117},
 | ||
|   year={2017},
 | ||
|   url={https://www.tandfonline.com/doi/abs/10.1080/01402390.2015.1115975},
 | ||
|   publisher={Taylor \& Francis}
 | ||
| }
 | ||
| 
 | ||
|   @article{article,
 | ||
|   author = {Turunen, Maija and Kari, Martti},
 | ||
|   year = {2022},
 | ||
|   month = {03},
 | ||
|   pages = {433-439},
 | ||
|   title = {Cumulative Cyber Deterrence},
 | ||
|   volume = {17},
 | ||
|   journal = {International Conference on Cyber Warfare and Security},
 | ||
|   doi = {10.34190/iccws.17.1.55}
 | ||
| }
 | ||
| 
 | ||
| @comment {U}
 | ||
| 
 | ||
| @comment {V}
 | ||
| 
 | ||
| @article{vosoughi_spread_2018,
 | ||
|   title = {The spread of true and false news online},
 | ||
|   volume = {359},
 | ||
|   issn = {0036-8075, 1095-9203},
 | ||
|   url = {https://www.science.org/doi/10.1126/science.aap9559},
 | ||
|   doi = {10.1126/science.aap9559},
 | ||
|   language = {en},
 | ||
|   number = {6380},
 | ||
|   urldate = {2023-11-03},
 | ||
|   journal = {Science},
 | ||
|   author = {Vosoughi, Soroush and Roy, Deb and Aral, Sinan},
 | ||
|   month = {mar},
 | ||
|   year = {2018},
 | ||
|   pages = {1146--1151},
 | ||
|   file = {Vosoughi et al. - 2018 - The spread of true and false news online.pdf:files/3731/Vosoughi et al. - 2018 - The spread of true and false news online.pdf:application/pdf},
 | ||
| }
 | ||
| @article{vemprala2021Debunk,
 | ||
|         title = {Debunking Misinformation Using a Game Theoretic Approach},
 | ||
|         author = {Vemprala, Naga and Gudigantala, Naveen and Chaganti, Raj},
 | ||
|         year = {2021},
 | ||
|         moth = {06},
 | ||
|         journal = {Emergent Research Forum (ERF)}
 | ||
| }
 | ||
| @comment {W}
 | ||
| 
 | ||
| @article{warikoo2021triangle,
 | ||
|   title={The triangle model for cyber threat attribution},
 | ||
|   author={Warikoo, Arun},
 | ||
|   journal={Journal of Cyber Security Technology},
 | ||
|   volume={5},
 | ||
|   number={3-4},
 | ||
|   pages={191--208},
 | ||
|   year={2021},
 | ||
|   publisher={Taylor \& Francis}
 | ||
| }
 | ||
| 
 | ||
| @comment {X}
 | ||
| @comment {Y}
 | ||
| 
 | ||
| @comment {Z}
 | ||
| 
 | ||
| 
 | ||
| 
 | 
