-
Notifications
You must be signed in to change notification settings - Fork 13
/
Articles_essentiels.bib
369 lines (322 loc) · 12.5 KB
/
Articles_essentiels.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
%Nous rassemblons ici des articles fondateurs dans les domaines de la cybersécurité, de la cyberdéfense et de la lutte contre la manipulation numérique
%merci d'utiliser le format ci-dessous pour saisir vos propositions
%Here we bring together seminal articles in the fields of cybersecurity, cyber defence and the fight against digital manipulation
%Please use the format below to enter your proposals
@article{Johnson,
author = {Edgar G. Johnson and Alfred O. Nier},
title = {Angular Aberrations in Sector Shaped
Electromagnetic Lenses for Focusing Beams of Charged Particles},
journal = {Physical Review},
volume = {91},
number = {1},
month = {jul},
year = {1953}
}
----------------------------------------------------------------------------------------------------------------------------------------------------------------
@comment {A}
@comment {B}
@article{bianco2013pyramid,
title={The pyramid of pain},
author={Bianco, David},
journal={Enterprise Detection \& Response},
year={2013},
note = {Post fondateur ou l'auteur développe le concept de la pyramide of pain qui consiste à classer les artefacts en focntion de la difficulté à les détecter (pour le défenseur) ou à les mettre en ouevre (pour l'attaquant)},
url = {http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html}
}
@article{bouchaud2023browsing,
title={Browsing Amazon's Book Bubbles},
author={Bouchaud, Paul},
year={2023},
url={https://hal.science/hal-04308081},
keywords={Amazon, filter bubble, Collaborative Filtering}
}
@comment {C}
@article{cattaruzza2018enjeux,
title={Les enjeux de la num{\'e}risation du champ de bataille},
author={Cattaruzza, Ama{\"e}l and Taillat, St{\'e}phane},
journal={Dynamiques internationales},
number={13},
year={2018},
pdf={https://hal.science/hal-01811385/document}
}
@article{cartwright_economics_2023,
title = {The economics of ransomware attacks on integrated supply chain networks},
url = {https://www.scinapse.io/papers/4319921249},
doi = {10.1145/3579647},
abstract = {Anna Cartwright},
language = {en},
urldate = {2023-11-29},
journal = {Digital threats},
author = {Cartwright, Anna and Cartwright, Edward},
month = feb,
year = {2023},
}
@article{chavalarias2024can,
title={Can a single line of code change society? the systemic risks of optimizing engagement in recommender systems on global information flow, opinion dynamics and social structures},
author={Chavalarias, David and Bouchaud, Paul and Panahi, Maziyar},
journal={Journal of Artificial Societies and Social Simulation},
volume={27},
number={1},
pages={1--9},
year={2024},
publisher={Journal of Artificial Societies and Social Simulation}
}
@comment {D}
@article{douzet2020cyberespace,
title={Le cyberespace, {\c{c}}a sert, d’abord, {\`a} faire la guerre. Prolif{\'e}ration, s{\'e}curit{\'e} et stabilit{\'e} du cyberespace},
author={Douzet, Fr{\'e}d{\'e}rick and G{\'e}ry, Aude},
journal={H{\'e}rodote},
number={2-3},
pages={329--350},
year={2020},
url = {https://www.cairn.info/revue-herodote-2020-2-page-329.htm},
publisher={Cairn/Cairn}
}
@article{douzet2020cartographier,
title={Cartographier la propagation des contenus russes et chinois sur le Web africain francophone},
author={Douzet, Fr{\'e}d{\'e}rick and Limonier, K{\'e}vin and Mihoubi, Selma and Ren{\'e}, {\'E}lodie},
journal={H{\'e}rodote},
number={2-3},
pages={77--99},
year={2020},
url = {https://www.cairn.info/revue-herodote-2020-2-page-77.htm},
publisher={Cairn/Cairn}
}
@article{douzet2018cyberespace,
title={Du cyberespace {\`a} la datasph{\`e}re. Le nouveau front pionnier de la g{\'e}ographie},
author={Douzet, Fr{\'e}d{\'e}rick and Desforges, Alix},
journal={Netcom. R{\'e}seaux, communication et territoires},
number={32-1/2},
pages={87--108},
year={2018},
keyword = {datasphère, cyberespace, révolution numérique, géopolitique, diplomatie},
url = {https://journals.openedition.org/netcom/3419},
publisher={Netcom Association}
}
@comment {E}
@comment {F}
@comment {G}
@article{glasze2023contested,
title={Contested spatialities of digital sovereignty},
author={Glasze, Georg and Cattaruzza, Ama{\"e}l and Douzet, Fr{\'e}d{\'e}rick and Dammann, Finn and Bertran, Marie-Gabrielle and B{\^o}mont, Clotilde and Braun, Matthias and Danet, Didier and Desforges, Alix and G{\'e}ry, Aude and others},
journal={Geopolitics},
volume={28},
number={2},
pages={919--958},
year={2023},
pdf = {https://www.tandfonline.com/doi/pdf/10.1080/14650045.2022.2050070},
publisher={Taylor \& Francis}
}
@article{gompert2014cyber,
title={Cyber warfare and Sino-American crisis instability},
author={Gompert, David C and Libicki, Martin},
journal={Survival},
volume={56},
number={4},
pages={7--22},
year={2014},
publisher={Taylor \& Francis},
keyword = {Stratégie, Chine, USA},
pdf = {https://www.tandfonline.com/doi/pdf/10.1080/00396338.2014.941543}
}
@article{grelot2021automation,
title={Automation of Binary Analysis: From Open Source Collection to Threat Intelligence},
author={Grelot, Frederic and Larinier, Sebastien and Salmon, Marie},
journal={Proceedings of the 28th C\&ESAR},
volume={41},
year={2021},
publisher={CEUR-WS Aachen, Germany},
pdf = {https://www.researchgate.net/profile/Marie-Salmon-2/publication/365361058_Automation_of_Binary_Analysis_From_Open_Source_Collection_to_Threat_Intelligence/links/6371fe4837878b3e87ad6e41/Automation-of-Binary-Analysis-From-Open-Source-Collection-to-Threat-Intelligence.pdf}
}
@comment {H}
@article{hanford2014cold,
title={The Cold War of Cyber Espionage},
author={Hanford, Elizabeth},
journal={Pub. Int. L. Rep.},
volume={20},
pages={22},
year={2014},
publisher={HeinOnline},
pdf = {https://lawecommons.luc.edu/cgi/viewcontent.cgi?article=1214&context=pilr}
}
@article{howard2018ira,
title={The IRA, social media and political polarization in the United States, 2012-2018},
author={Howard, Philip N and Ganesh, Bharath and Liotsiou, Dimitra and Kelly, John and Fran{\c{c}}ois, Camille},
year={2018},
publisher={Project on Computational Propaganda},
url={https://research.rug.nl/en/publications/the-ira-social-media-and-political-polarization-in-the-united-sta}
}
@comment {I}
@comment {J}
@comment {K}
@article{kok2020cyber,
title={Cyber Threat Prediction with Machine Learning},
author={Kok, Arvid and Mestric, Ivana Ilic and Valiyev, Giavid and Street, Michael},
journal={Information \& Security},
volume={47},
number={2},
pages={203--220},
year={2020},
publisher={ProCon Ltd.},
pdf = {https://connections-qj.org/system/files/4714_cyber_threat_assessment.pdf}
}
@comment {L}
@article{li_comprehensive_2021,
title={A comprehensive review study of cyber-attacks and cyber security; {Emerging} trends and recent developments},
author={Li, Yuchong and Liu, Qinghui},
journal={Energy Reports},
volume={7},
issn = {2352-4847},
url = {https://www.sciencedirect.com/science/article/pii/S2352484721007289},
doi = {10.1016/j.egyr.2021.08.126},
year={2021},
note = {Une revue de littérature définissant les concepts clés de la cyberdéfense (cyberattaque, cybersécurité, etc.)}
}
@article{libicki2012cyberspace,
title={Cyberspace is not a warfighting domain},
author={Libicki, Martin C},
journal={Isjlp},
volume={8},
pages={321},
year={2012},
publisher={HeinOnline},
note = {Au-delà du titre provocateur cet article est essentiel à la compréhension de la pensée stratégique américaine sur le cyberespace. L'auteur y développe un concept original pour mieux appréhender l'action dans le cyberespace et ne pas en faire un simple "domaine" de confrontation supplèmentaire.},
pdf = {https://kb.osu.edu/server/api/core/bitstreams/0f5c21be-28f3-5951-926c-6bdcab243319/content},
keyword = {stratégie, cyberwarfare, cyberdéfense, USA}
}
@article{libicki2015cyber,
title={The cyber war that wasn’t},
author={Libicki, Martin and Geers, Kenneth},
journal={Cyber war in perspective: Russian aggression against Ukraine},
pages={49--54},
year={2015},
publisher={NATO Cyber Center of Excellence, NATO CCD COE Tallinn, Estonia},
pdf = {https://ccdcoe.org/uploads/2018/10/Ch05_CyberWarinPerspective_Libicki.pdf}
}
@comment {M}
@comment {N}
@article{Nimmo2015anatomy,
author = {Ben Nimmo},
title = {Anatomy of an info-war:how Russia's propaganda machine works, and how to counter it},
journal = {Central European Policy Institute},
number = {15},
year = {2015},
keywords = {désinformation, propagande, Russie, infowar},
note = {}
}
@comment {O}
@article{oruc2022assessing,
title={Assessing cyber risks of an INS using the MITRE ATT\&CK framework},
author={Oruc, Aybars and Amro, Ahmed and Gkioulos, Vasileios},
journal={Sensors},
volume={22},
number={22},
pages={8745},
year={2022},
publisher={MDPI},
note = {Article utile pour ceux qui travaillent dans la cybersécurité maritime},
keyword = {navigation, MITRE ATT\&CK, marine}
}
@inproceedings{ozkan2023zero,
title={Zero-Day Operational Cyber Readiness},
author={{\"O}zkan, Bar{\i}{\c{s}} Egemen and Tolga, {\.I}hsan B},
booktitle={2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)},
pages={199--215},
year={2023},
organization={IEEE},
note = {Publication de la célébre conf CyCon qui présente le concept de Zero-Day Readiness pour faire face aux défis de la connectivité permanente},
pdf = {https://ieeexplore.ieee.org/abstract/document/10181814}
}
@comment {P}
@comment {Q}
@comment {R}
@article{raad2024protecting,
title={Protecting freedom of thought: mitigating technological enablers of disinformation},
author={Raad, Alexa},
year={2024},
pdf={https://apo.org.au/sites/default/files/resource-files/2024-01/apo-nid325403.pdf},
publisher={Centre for International Governance Innovation}
}
@comment {S}
@comment {T}
@article{tabansky2011basic,
title={Basic concepts in cyber warfare},
author={Tabansky, Lior},
journal={Military and Strategic Affairs},
volume={3},
number={1},
pages={75--92},
year={2011},
pdf = {https://indianstrategicknowledgeonline.com/web/1308129610.pdf},
note = {synthèse assez complète de la vision du concept de cyberwarfare dans les années 2010}
}
@article{thompson2020threat,
title={Threat hunting},
author={Thompson, Eric C and Thompson, Eric C},
journal={Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events},
pages={205--212},
year={2020},
publisher={Springer},
pdf = {https://link.springer.com/chapter/10.1007/978-1-4842-5608-4_7},
note = {article qui pose les base du threat hunting}
}
@article{tor2017cumulative,
title={‘Cumulative deterrence’as a new paradigm for cyber deterrence},
author={Tor, Uri},
journal={Journal of Strategic Studies},
volume={40},
number={1-2},
pages={92--117},
year={2017},
url={https://www.tandfonline.com/doi/abs/10.1080/01402390.2015.1115975},
publisher={Taylor \& Francis}
}
@article{article,
author = {Turunen, Maija and Kari, Martti},
year = {2022},
month = {03},
pages = {433-439},
title = {Cumulative Cyber Deterrence},
volume = {17},
journal = {International Conference on Cyber Warfare and Security},
doi = {10.34190/iccws.17.1.55}
}
@comment {U}
@comment {V}
@article{vosoughi_spread_2018,
title = {The spread of true and false news online},
volume = {359},
issn = {0036-8075, 1095-9203},
url = {https://www.science.org/doi/10.1126/science.aap9559},
doi = {10.1126/science.aap9559},
language = {en},
number = {6380},
urldate = {2023-11-03},
journal = {Science},
author = {Vosoughi, Soroush and Roy, Deb and Aral, Sinan},
month = {mar},
year = {2018},
pages = {1146--1151},
file = {Vosoughi et al. - 2018 - The spread of true and false news online.pdf:files/3731/Vosoughi et al. - 2018 - The spread of true and false news online.pdf:application/pdf},
}
@article{vemprala2021Debunk,
title = {Debunking Misinformation Using a Game Theoretic Approach},
author = {Vemprala, Naga and Gudigantala, Naveen and Chaganti, Raj},
year = {2021},
moth = {06},
journal = {Emergent Research Forum (ERF)}
}
@comment {W}
@article{warikoo2021triangle,
title={The triangle model for cyber threat attribution},
author={Warikoo, Arun},
journal={Journal of Cyber Security Technology},
volume={5},
number={3-4},
pages={191--208},
year={2021},
publisher={Taylor \& Francis}
}
@comment {X}
@comment {Y}
@comment {Z}