Bibliography/Articles_essentiels.bib
2023-10-31 17:58:07 +01:00

129 строки
3.8 KiB
BibTeX

%Nous rassemblon ici des articles fondateurs dans les domaines de la cybersécurité, de la cyberdéfense et de la lutte contre la manipulation numérique
%merci d'utiliser le format ci-dessous pour saisir vos propositions
%Here we bring together seminal articles in the fields of cybersecurity, cyber defence and the fight against digital manipulation
%Please use the format below to enter your proposals
@article{Johnson,
author = {Edgar G. Johnson and Alfred O. Nier},
title = {Angular Aberrations in Sector Shaped
Electromagnetic Lenses for Focusing Beams of Charged Particles},
journal = {Physical Review},
volume = {91},
number = {1},
month = {jul},
year = {1953}
}
----------------------------------------------------------------------------------------------------------------------------------------------------------------
@comment {A}
@comment {B}
@article{bianco2013pyramid,
title={The pyramid of pain},
author={Bianco, David},
journal={Enterprise Detection \& Response},
year={2013},
note = {Post fondateur ou l'auteur développe le concept de la pyramide of pain qui consiste à classer les artefacts en focntion de la difficulté à les détecter (pour le défenseur) ou à les mettre en ouevre (pour l'attaquant)},
url = {http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html}
}
@comment {C}
@comment {D}
@comment {E}
@comment {F}
@comment {G}
@comment {H}
@comment {I}
@comment {J}
@comment {K}
@article{kok2020cyber,
title={Cyber Threat Prediction with Machine Learning},
author={Kok, Arvid and Mestric, Ivana Ilic and Valiyev, Giavid and Street, Michael},
journal={Information \& Security},
volume={47},
number={2},
pages={203--220},
year={2020},
publisher={ProCon Ltd.},
pdf = {https://connections-qj.org/system/files/4714_cyber_threat_assessment.pdf}
}
@comment {L}
@comment {M}
@comment {N}
@article{Nimmo2015anatomy,
author = {Ben Nimmo},
title = {Anatomy of an info-war:how Russia's propaganda machine works, and how to counter it},
journal = {Central European Policy Institute},
number = {15},
year = {2015},
keywords = {désinformation, propagande, Russie, infowar},
note = {}
}
@comment {O}
@article{oruc2022assessing,
title={Assessing cyber risks of an INS using the MITRE ATT\&CK framework},
author={Oruc, Aybars and Amro, Ahmed and Gkioulos, Vasileios},
journal={Sensors},
volume={22},
number={22},
pages={8745},
year={2022},
publisher={MDPI},
note = {Article utile pour ceux qui travaillent dans la cybersécurité maritime},
keyword = {navigation, MITRE ATT\&CK, marine}
}
@comment {P}
@comment {Q}
@comment {R}
@comment {S}
@comment {T}
@article{tabansky2011basic,
title={Basic concepts in cyber warfare},
author={Tabansky, Lior},
journal={Military and Strategic Affairs},
volume={3},
number={1},
pages={75--92},
year={2011},
pdf = {https://indianstrategicknowledgeonline.com/web/1308129610.pdf},
note = {synthèse assez complète de la vision du concept de cyberwarfare dans les années 2010}
}
@article{thompson2020threat,
title={Threat hunting},
author={Thompson, Eric C and Thompson, Eric C},
journal={Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events},
pages={205--212},
year={2020},
publisher={Springer},
pdf = {https://link.springer.com/chapter/10.1007/978-1-4842-5608-4_7},
note = {article qui pose les base du threat hunting}
}
@comment {U}
@comment {V}
@comment {W}
@article{warikoo2021triangle,
title={The triangle model for cyber threat attribution},
author={Warikoo, Arun},
journal={Journal of Cyber Security Technology},
volume={5},
number={3-4},
pages={191--208},
year={2021},
publisher={Taylor \& Francis}
}
@comment {X}
@comment {Y}
@comment {Z}