Countering the Offensive Advantage in Cyber-space: An Integrated Defensive Strategy, 4th International Conference on Cyber Conflict, pp.197-207, 2012. ,
National Cyber Security Framework Manual, 2012. ,
Cyber-war. Methods and Practice, version 6.0. http://www. dirk-koentopp.com/downloads/saalbach-cyberwar-methods-and-practice. pdf, 2013. ,
Cyber-war Profiling, a new Method for the Analysis of a Cyber-Conflict, 2013. ,
Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies, Computers & Security, vol.27, issue.1-2, pp.48-62, 2008. ,
DOI : 10.1016/j.cose.2007.11.001
Automatic Security Assessment for Next Generation Wireless Mobile Networks, Mobile Information Systems, vol.7, issue.3, pp.217-239, 2011. ,
DOI : 10.1155/2011/404328
URL : http://doi.org/10.1155/2011/404328
Audit-Based Access Control in Nomadic Wireless Environments, Computational Science and Its Applications -ICCSA 2006 of Lecture Notes in Computer Science, pp.537-545, 2006. ,
DOI : 10.1007/11751595_57
Network anomaly detection through nonlinear analysis, Computers & Security, vol.29, issue.7, pp.737-755, 2010. ,
DOI : 10.1016/j.cose.2010.05.002
Network anomaly detection with the restricted Boltzmann machine, Neurocomputing, vol.122, issue.0, 2013. ,
DOI : 10.1016/j.neucom.2012.11.050
Situation Awareness: Papers and Annotated Bibliography, U.S. Department of Defense, Defense Technical Information Center (DTIC), 1994. ,
Digital Profiling: A Computer Forensics Approach, Lecture Notes in Computer Science, vol.6908, pp.330-343, 2011. ,
DOI : 10.1007/978-3-642-23300-5_26
The Digital Profiling Techniques Applied to the Analysis of a GPS Navigation Device, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.591-596, 2012. ,
DOI : 10.1109/IMIS.2012.202
Device Tracking in Private Networks via NAPT Log Analysis, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.603-608, 2012. ,
DOI : 10.1109/IMIS.2012.125
Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel, Multidisciplinary Research and Practice for Information Systems. Volume 7465 of Lecture Notes in Computer Science, pp.416-429, 2012. ,
DOI : 10.1007/978-3-642-32498-7_31
A botnetbased command and control approach relying on swarm intelligence, Journal of Network and Computer Applications, issue.0, 2013. ,
DOI : 10.1016/j.jnca.2013.05.002
Ius ad bellum in Cyberspace -Some Thoughts on the " Schmitt- Criteria " for Use of Force, 4th International Conference on Cyber Conflict, pp.295-309, 2012. ,
A methodology for cyber operations targeting and control of collateral damage in the context of lawful armed conflict, Cyber Conflict (CYCON), 2012 4th International Conference on, pp.1-13, 2012. ,
Duqu: A Stuxnetlike malware found in the wild, 2011. ,
Mercury Live DVD. http://mercurylivedvd.sourceforge.net/ (2013) Cyber Threats Monitoring: Experimental Analysis of Malware Behavior XVII ,
How to Forge a Digital Alibi on Mac??OS??X, Multidisciplinary Research and Practice for Information Systems. Volume 7465 of Lecture Notes in Computer Science, pp.430-444, 2012. ,
DOI : 10.1007/978-3-642-32498-7_32
On the Construction of a False Digital Alibi on the Android OS, 2011 Third International Conference on Intelligent Networking and Collaborative Systems, pp.685-690, 2011. ,
DOI : 10.1109/INCoS.2011.129
Automated Production of Predetermined Digital Evidence, IEEE Access, vol.1, pp.216-231, 2013. ,
DOI : 10.1109/ACCESS.2013.2260817
Automated Construction of a False Digital Alibi, Lecture Notes in Computer Science, vol.6908, pp.359-373, 2011. ,
DOI : 10.1007/978-3-642-23300-5_28
The Forensic Analysis of a False Digital Alibi, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.114-121, 2012. ,
DOI : 10.1109/IMIS.2012.127
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned, Journal in Computer Virology, vol.39, issue.5, pp.143-157, 2011. ,
DOI : 10.1007/s11416-010-0144-2
URL : https://hal.archives-ouvertes.fr/hal-00762596
Profiling Honeynet Attackers, Proceedings of the Class of 2006 Senior Conference, pp.19-26, 2005. ,
Analyzing Malicious SSH Login Attempts. http://www.symantec. com/connect/articles/analyzing-malicious-ssh-login-attempts, 2010. ,
Backdoor:Win32/Ixeshe, 2013. ,
IXESHE An APT Campaign, 20102. ,
Command and control of cyber weapons, Cyber Conflict (CYCON), 2012 4th International Conference on, pp.1-11, 2012. ,
Security and privacy issues in the Portable Document Format, Journal of Systems and Software, vol.83, issue.10, pp.1813-1822, 2010. ,
DOI : 10.1016/j.jss.2010.04.062
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures ) Information Security and Privacy Research, IFIP Advances in Information and Communication Technology, pp.13-24, 2012. ,
Breaking and fixing the Android Launching Flow, Computers & Security, vol.39, issue.0, 2013. ,
DOI : 10.1016/j.cose.2013.03.009
Forensically-Sound Methods to Collect Live Network Evidence, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), pp.405-412, 2013. ,
DOI : 10.1109/AINA.2013.133