зеркало из
https://github.com/M82-project/Bibliography.git
synced 2025-10-29 13:06:06 +02:00
90 строки
2.7 KiB
BibTeX
90 строки
2.7 KiB
BibTeX
%Nous rassemblon ici des articles fondateurs dans les domaines de la cybersécurité, de la cyberdéfense et de la lutte contre la manipulation numérique
|
|
%merci d'utiliser le format ci-dessous pour saisir vos propositions
|
|
|
|
%Here we bring together seminal articles in the fields of cybersecurity, cyber defence and the fight against digital manipulation
|
|
%Please use the format below to enter your proposals
|
|
|
|
@article{Johnson,
|
|
author = {Edgar G. Johnson and Alfred O. Nier},
|
|
title = {Angular Aberrations in Sector Shaped
|
|
Electromagnetic Lenses for Focusing Beams of Charged Particles},
|
|
journal = {Physical Review},
|
|
volume = {91},
|
|
number = {1},
|
|
month = {jul},
|
|
year = {1953}
|
|
}
|
|
|
|
----------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
@comment {A}
|
|
@comment {B}
|
|
|
|
@article{bianco2013pyramid,
|
|
title={The pyramid of pain},
|
|
author={Bianco, David},
|
|
journal={Enterprise Detection \& Response},
|
|
year={2013},
|
|
note = {Post fondateur ou l'auteur développe le concept de la pyramide of pain qui consiste à classer les artefacts en focntion de la difficulté à les détecter (pour le défenseur) ou à les mettre en ouevre (pour l'attaquant)},
|
|
url = {http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html}
|
|
}
|
|
|
|
@comment {C}
|
|
@comment {D}
|
|
@comment {E}
|
|
@comment {F}
|
|
@comment {G}
|
|
@comment {H}
|
|
@comment {I}
|
|
@comment {J}
|
|
@comment {K}
|
|
@comment {L}
|
|
@comment {M}
|
|
@comment {N}
|
|
|
|
@article{Nimmo2015anatomy,
|
|
author = {Ben Nimmo},
|
|
title = {Anatomy of an info-war:how Russia's propaganda machine works, and how to counter it},
|
|
journal = {Central European Policy Institute},
|
|
number = {15},
|
|
year = {2015},
|
|
keywords = {désinformation, propagande, Russie, infowar},
|
|
note = {}
|
|
}
|
|
|
|
@comment {O}
|
|
@comment {P}
|
|
@comment {Q}
|
|
@comment {R}
|
|
@comment {S}
|
|
@comment {T}
|
|
|
|
@article{thompson2020threat,
|
|
title={Threat hunting},
|
|
author={Thompson, Eric C and Thompson, Eric C},
|
|
journal={Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events},
|
|
pages={205--212},
|
|
year={2020},
|
|
publisher={Springer},
|
|
pdf = {https://link.springer.com/chapter/10.1007/978-1-4842-5608-4_7},
|
|
note = {article qui pose les base du threat hunting}
|
|
}
|
|
|
|
@comment {U}
|
|
@comment {V}
|
|
@comment {W}
|
|
|
|
@article{warikoo2021triangle,
|
|
title={The triangle model for cyber threat attribution},
|
|
author={Warikoo, Arun},
|
|
journal={Journal of Cyber Security Technology},
|
|
volume={5},
|
|
number={3-4},
|
|
pages={191--208},
|
|
year={2021},
|
|
publisher={Taylor \& Francis}
|
|
}
|
|
|
|
@comment {X}
|
|
@comment {Y}
|
|
@comment {Z}
|