Talk:Man-on-the-side attack
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||
|
Untitled
editHi I'm Quackdon, I plan to expand the page using the following resources:
Lévesque, F., Chiasson, S., Somayaji, A. and Fernandez, J., 2018. Technological and Human Factors of Malware Attacks. ACM Transactions on Privacy and Security, 21(4), pp.1-30. [PDF] Kjaerland, Maria. 2005. "A Classification Of Computer Security Incidents Based On Reported Attack Data." Journal of Investigative Psychology and Offender Profiling 2(2):105-120. [PDF]
Salva, Sébastien, and Loukmen Regainia. 2019. "A Catalogue Associating Security Patterns And Attack Steps To Design Secure Applications." Journal of Computer Security 27(1):49-74.
[PDF]
Valente, Junia, Matthew A. Wynn, and Alvaro A. Cardenas. 2019. "Stealing, Spying, And Abusing: Consequences Of Attacks On Internet Of Things Devices." IEEE Security & Privacy 17(5):9-26.
[PDF]
Varadharajan, Vijay, and Uday Tupakula. 2020. "Counteracting Attacks From Malicious End Hosts In Software Defined Networks." IEEE Transactions on Network and Service Management 17(1):160-176.
[PDF]
Dey, Debabrata, Atanu Lahiri, and Guoying Zhang. 2011. "Hacker Behavior, Network Effects, And The Security Software Market." SSRN Electronic Journal. 29(2): 77-108
[PDF]
Stergiopoulos, George, Dimitris A. Gritzalis, and Evangelos Limnaios. 2020. "Cyber-Attacks On The Oil & Gas Sector: A Survey On Incident Assessment And Attack Patterns." IEEE Access 8:128440-128475.
[PDF]
Redondo, Alberto, and David Ríos Insua. 2020. "Protecting From Malware Obfuscation Attacks Through Adversarial Risk Analysis." Risk Analysis 18(4):178-197.
[PDF]
Mushtaq, Maria et al. 2020. "WHISPER: A Tool For Run-Time Detection Of Side-Channel Attacks." IEEE Access 8:83871-83900.
[PDF]
Molotkov, S. N. 2020. "Trojan Horse Attacks, Decoy State Method, And Side Channels Of Information Leakage In Quantum Cryptography." Journal of Experimental and Theoretical Physics 130(6):809-832.
{PDF]
Albahar, Marwan. 2017. "Cyber Attacks And Terrorism: A Twenty-First Century Conundrum." Science and Engineering Ethics 25(4):993-1008.
[PDF]
de Arimatéia da Cruz, José. 2020. "Cyber Mercenaries: A New Threat to National Security". International Social Science Review. 2020, 96(2): 1-33.
[PDF]
Monarch, Benjamin. 2020. "Black Start: The Risk Of Grid Failure From A Cyber Attack And The Policies Needed To Prepare For It." Journal of Energy & Natural Resources Law 38(2):131-160.
[PDF]
Vasilescu, Cezar. 2012. "Cyber Attacks:Emerging Threats To The 21St Century Critical Information Infrastructures." Obrana a strategie (Defence & Strategy) 12(1):053-072.
[PDF]
Douzet, Frederick. 2014. "Understanding Cyberspace with Geopolitics". In Hérodote 152(1): 3-21
[PDF]
Ruhl, Christian, Duncan Hollis, Wyatt Hoffman, and Tim Maurer. 2020. "Cyberspace and Geopolitics: Assessing Global Cybersecurity Norm Pro cesses at a Crossroads"Carnegie Endowment for International Peace. 14(1): 7-32
[PDF]
Haddad, Christian, and Clemens Binder. 2019. "Governing Through Cybersecurity: National Policy Strategies, Globalized (In‑)Security And Sociotechnical Visions Of The Digital Society." Österreichische Zeitschrift für Soziologie 44(S1):115-134.
[PDF]
McConnell, Mike. 2017 "10th Annual Law & Society Symposium: Cybersecurity: Keeping Us Safe or Making Us Vulnerable". 12 Charleston L. Rev. 323 (Summer 2018) / Charleston Law Review. 12(3): 323-341
{pdf]
de Oliveira Albuquerque, Robson, Luis Javier García Villalba, Ana Lucila Sandoval Orozco, Rafael Timóteo de Sousa Júnior, and Tai-Hoon Kim. 2015. "Leveraging Information Security And Computational Trust For Cybersecurity." The Journal of Supercomputing 72(10):3729-3763.
[PDF] Stevens, Clare. 2019. "Assembling Cybersecurity: The Politics And Materiality Of Technical Malware Reports And The Case Of Stuxnet." Contemporary Security Policy 41(1):129-152. [PDF] — Preceding unsigned comment added by Quackdon (talk • contribs) 05:41, 18 October 2020 (UTC)
Wiki Education Foundation-supported course assignment
editThis article was the subject of a Wiki Education Foundation-supported course assignment, between 19 September 2020 and 19 December 2020. Further details are available on the course page. Student editor(s): Quackdon. Peer reviewers: IntheHeartofTexas, Niangao, BunnyShampoo, Imakespaghetti29, Moonstar0619, Sfwarriors99.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 14:36, 18 January 2022 (UTC)