Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model, International Conference on Human Choice and Computers (HCC10): ICT Critical Infrastructures and Society, IFIP, pp.226-236, 2012. ,
DOI : 10.1007/978-3-642-33332-3_21
Classifying network attack scenarios using an ontology, Proceedings of the 7th International Conference on Information-Warfare & Security, pp.311-324, 2012. ,
Industrial espionage today and information wars of tomorrow, 19th National Information Systems Security Conference, pp.139-151, 1996. ,
Trade secrecy as an instrument of national security?rethinking the foundations of economic espionage, Arizona State Law Journal, vol.41, pp.933-1167, 2009. ,
Simulating adversarial interactions between intruders and system administrators using OODA-RR, Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries , SAICSIT '07, pp.46-55, 2007. ,
DOI : 10.1145/1292491.1292497
A Computer Network Attack Taxonomy and Ontology, International Journal of Cyber Warfare and Terrorism, vol.2, issue.3, pp.12-25, 2012. ,
DOI : 10.4018/ijcwt.2012070102
How to determine threat probabilities using ontologies and Bayesian networks, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW '09, p.69, 2009. ,
DOI : 10.1145/1558607.1558686
A Geolocation Databases Study, IEEE Journal on Selected Areas in Communications, vol.29, issue.10, pp.2044-2056, 2011. ,
DOI : 10.1109/JSAC.2011.111214
Nmap detection and countermeasures, Online, 2008. ,
Analyzing network security from a defense in depth perspective, 2011. ,
Detecting Long Connection Chains of Interactive Terminal Sessions, Recent Advances in Intrusion Detection, pp.1-16, 2002. ,
DOI : 10.1007/3-540-36084-0_1
Honeypots: catching the insider threat, 19th Annual Computer Security Applications Conference, 2003. Proceedings., pp.170-179, 2003. ,
DOI : 10.1109/CSAC.2003.1254322
Towards insider threat detection using web server logs, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW '09, pp.54-58, 2009. ,
DOI : 10.1145/1558607.1558670
IP geolocation databases, ACM SIGCOMM Computer Communication Review, vol.41, issue.2, pp.53-56, 2011. ,
DOI : 10.1145/1971162.1971171
URL : https://hal.archives-ouvertes.fr/hal-00748223
Towards IP geolocation using delay and topology measurements, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.71-84, 2006. ,
DOI : 10.1145/1177080.1177090
Obama order sped up wave of cyberattacks against iran, Online, 2012. ,
Crowdsourcing cyber security: a property rights view of exclusion and theft on the information commons, International Journal of the Commons, vol.7, issue.1, pp.93-112, 2013. ,
DOI : 10.18352/ijc.343
Testing a website: Best practices, Reveregroup, 2001. ,
A survey of intrusion detection techniques, Computers & Security, vol.12, issue.4, pp.405-418, 1993. ,
DOI : 10.1016/0167-4048(93)90029-5
Investigating the problem of IDS false alarms: An experimental study using Snort, Proceedings of the IFIP TC 11 23rd International Information Security Conference, pp.253-267, 2008. ,
DOI : 10.1007/978-0-387-09699-5_17
Impact analysis of faults and attacks in large-scale networks, IEEE Security & Privacy Magazine, vol.1, issue.5, pp.49-54, 2003. ,
DOI : 10.1109/MSECP.2003.1236235
A dynamic honeypot design for intrusion detection, International Conference on Pervasive Services (ICPS), pp.95-104, 2004. ,
Surveying Port Scans and Their Detection Methodologies, The Computer Journal, vol.54, issue.10, pp.1565-1581, 2011. ,
DOI : 10.1093/comjnl/bxr035
Spear phishing attack detection Master's thesis, Air Force Institute of Technology, 2011. ,
Social engineering from a normative ethics perspective, 2013 Information Security for South Africa, pp.1-8, 2013. ,
DOI : 10.1109/ISSA.2013.6641064
Social engineering attack detection model: SEADM, 2010 Information Security for South Africa, pp.1-8, 2010. ,
DOI : 10.1109/ISSA.2010.5588500
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.233.261
Development of cognitive functioning psychological measures for the seadm, In: Human Aspects of Information Security & Assurance, 2012. ,
Towards an Ontological Model Defining the Social Engineering Domain, 11th Human Choice and Computers International Conference, 2014. ,
DOI : 10.1007/978-3-662-44208-1_22
URL : https://hal.archives-ouvertes.fr/hal-01383064
A network security monitor, Proceedings of Computer Society Symposium on Research in Security and Privacy, pp.296-304, 1990. ,
Testing malware detectors, ACM SIGSOFT Software Engineering Notes, vol.29, issue.4, pp.34-44, 2004. ,
DOI : 10.1145/1013886.1007518
What is a false positive and why are false positives a problem? Online, 2010. ,
A Method of Detecting Sql Injection Attack to Secure Web Applications, International Journal of Distributed and Parallel systems, vol.3, issue.6, pp.1-8, 2012. ,
DOI : 10.5121/ijdps.2012.3601
A heuristic-based approach for detecting sqlinjection vulnerabilities in web applications, Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems, pp.43-49, 2010. ,
A simple and efficient framework for detection of sql injection attack, International Journal of Computer & Communication Engineering Research, vol.1, issue.2, pp.26-30, 2013. ,
Defeating script injection attacks with browser-enforced embedded policies, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.601-610, 2007. ,
DOI : 10.1145/1242572.1242654
An empirical analysis of input validation mechanisms in web applications and languages, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, pp.1419-1426, 2012. ,
DOI : 10.1145/2245276.2232004
Defending against web vulnerabilities and cross-site scripting, Journal of Global Research in Computer Science, vol.3, issue.5, pp.61-64, 2012. ,
Remote denial of service attacks and countermeasures, 2001. ,
A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM Computer Communication Review, vol.34, issue.2, pp.39-53, 2004. ,
DOI : 10.1145/997150.997156
A highly available network file server, Proceedings of the 1991 USENIX Winter Conference, pp.199-205, 1991. ,
Anomaly-based intrusion detection for scada systems, 5th International Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT 05, pp.12-16, 2006. ,
Correlating ids alerts with vulnerability information, Technical Report Revision Tenable Network Security, vol.4, 2011. ,