D. T. Fahrenkrug, Countering the Offensive Advantage in Cyber-space: An Integrated Defensive Strategy, 4th International Conference on Cyber Conflict, pp.197-207, 2012.

A. Klimburg, . Nato, and . Coe-publications, National Cyber Security Framework Manual, 2012.

K. Saalbach, Cyber-war. Methods and Practice, version 6.0. http://www. dirk-koentopp.com/downloads/saalbach-cyberwar-methods-and-practice. pdf, 2013.

C. Colombini, A. Colella, and M. Mattiucci, Cyber-war Profiling, a new Method for the Analysis of a Cyber-Conflict, 2013.

F. Palmieri and U. Fiore, Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies, Computers & Security, vol.27, issue.1-2, pp.48-62, 2008.
DOI : 10.1016/j.cose.2007.11.001

F. Palmieri, U. Fiore, and A. Castiglione, Automatic Security Assessment for Next Generation Wireless Mobile Networks, Mobile Information Systems, vol.7, issue.3, pp.217-239, 2011.
DOI : 10.1155/2011/404328

URL : http://doi.org/10.1155/2011/404328

F. Palmieri, U. Fiore, M. Gavrilova, O. Gervasi, V. Kumar et al., Audit-Based Access Control in Nomadic Wireless Environments, Computational Science and Its Applications -ICCSA 2006 of Lecture Notes in Computer Science, pp.537-545, 2006.
DOI : 10.1007/11751595_57

F. Palmieri and U. Fiore, Network anomaly detection through nonlinear analysis, Computers & Security, vol.29, issue.7, pp.737-755, 2010.
DOI : 10.1016/j.cose.2010.05.002

U. Fiore, F. Palmieri, A. Castiglione, and A. De-santis, Network anomaly detection with the restricted Boltzmann machine, Neurocomputing, vol.122, issue.0, 2013.
DOI : 10.1016/j.neucom.2012.11.050

M. Vidulich, C. Dominguez, E. Vogel, and G. Mcmillian, Situation Awareness: Papers and Annotated Bibliography, U.S. Department of Defense, Defense Technical Information Center (DTIC), 1994.

C. M. Colombini and A. Colella, Digital Profiling: A Computer Forensics Approach, Lecture Notes in Computer Science, vol.6908, pp.330-343, 2011.
DOI : 10.1007/978-3-642-23300-5_26

C. Colombini, A. Colella, A. Castiglione, and V. Scognamiglio, The Digital Profiling Techniques Applied to the Analysis of a GPS Navigation Device, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.591-596, 2012.
DOI : 10.1109/IMIS.2012.202

A. Castiglione, A. De-santis, U. Fiore, and F. Palmieri, Device Tracking in Private Networks via NAPT Log Analysis, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.603-608, 2012.
DOI : 10.1109/IMIS.2012.125

C. M. Colombini, A. Colella, M. Mattiucci, and A. Castiglione, Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel, Multidisciplinary Research and Practice for Information Systems. Volume 7465 of Lecture Notes in Computer Science, pp.416-429, 2012.
DOI : 10.1007/978-3-642-32498-7_31

A. Castiglione, R. De-prisco, A. De-santis, U. Fiore, and F. Palmieri, A botnetbased command and control approach relying on swarm intelligence, Journal of Network and Computer Applications, issue.0, 2013.
DOI : 10.1016/j.jnca.2013.05.002

K. Ziolkowski, Ius ad bellum in Cyberspace -Some Thoughts on the " Schmitt- Criteria " for Use of Force, 4th International Conference on Cyber Conflict, pp.295-309, 2012.

R. Fanelli and G. Conti, A methodology for cyber operations targeting and control of collateral damage in the context of lawful armed conflict, Cyber Conflict (CYCON), 2012 4th International Conference on, pp.1-13, 2012.

B. Bencsáth, G. Pék, L. Buttyán, and M. Félegyházi, Duqu: A Stuxnetlike malware found in the wild, 2011.

J. Moore, Mercury Live DVD. http://mercurylivedvd.sourceforge.net/ (2013) Cyber Threats Monitoring: Experimental Analysis of Malware Behavior XVII

A. Castiglione, G. Cattaneo, R. De-prisco, A. De-santis, and K. Yim, How to Forge a Digital Alibi on Mac??OS??X, Multidisciplinary Research and Practice for Information Systems. Volume 7465 of Lecture Notes in Computer Science, pp.430-444, 2012.
DOI : 10.1007/978-3-642-32498-7_32

P. Albano, A. Castiglione, G. Cattaneo, G. De-maio, and A. De-santis, On the Construction of a False Digital Alibi on the Android OS, 2011 Third International Conference on Intelligent Networking and Collaborative Systems, pp.685-690, 2011.
DOI : 10.1109/INCoS.2011.129

A. Castiglione, G. Cattaneo, G. De-maio, and A. De-santis, Automated Production of Predetermined Digital Evidence, IEEE Access, vol.1, pp.216-231, 2013.
DOI : 10.1109/ACCESS.2013.2260817

D. Santis, A. Castiglione, A. Cattaneo, G. De-maio, G. Ianulardo et al., Automated Construction of a False Digital Alibi, Lecture Notes in Computer Science, vol.6908, pp.359-373, 2011.
DOI : 10.1007/978-3-642-23300-5_28

A. Castiglione, G. Cattaneo, G. De-maio, A. De-santis, G. Costabile et al., The Forensic Analysis of a False Digital Alibi, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.114-121, 2012.
DOI : 10.1109/IMIS.2012.127

V. Nicomette, M. Kaâniche, E. Alata, and M. Herrb, Set-up and deployment of a high-interaction honeypot: experiment and lessons learned, Journal in Computer Virology, vol.39, issue.5, pp.143-157, 2011.
DOI : 10.1007/s11416-010-0144-2

URL : https://hal.archives-ouvertes.fr/hal-00762596

C. Li and T. Parsioan, Profiling Honeynet Attackers, Proceedings of the Class of 2006 Senior Conference, pp.19-26, 2005.

C. Seifert, Analyzing Malicious SSH Login Attempts. http://www.symantec. com/connect/articles/analyzing-malicious-ssh-login-attempts, 2010.

E. Threat and . Ltd, Backdoor:Win32/Ixeshe, 2013.

D. Sancho, J. Dela-torre, M. Bakuei, N. Villeneuve, and R. Mcardle, IXESHE An APT Campaign, 20102.

E. Tyugu, Command and control of cyber weapons, Cyber Conflict (CYCON), 2012 4th International Conference on, pp.1-11, 2012.

A. Castiglione, A. De-santis, and C. Soriente, Security and privacy issues in the Portable Document Format, Journal of Systems and Software, vol.83, issue.10, pp.1813-1822, 2010.
DOI : 10.1016/j.jss.2010.04.062

A. Armando, A. Merlo, M. Migliardi, and L. Verderame, Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures ) Information Security and Privacy Research, IFIP Advances in Information and Communication Technology, pp.13-24, 2012.

A. Armando, A. Merlo, M. Migliardi, and L. Verderame, Breaking and fixing the Android Launching Flow, Computers & Security, vol.39, issue.0, 2013.
DOI : 10.1016/j.cose.2013.03.009

A. Castiglione, G. Cattaneo, . De-maio, D. Giancarlo, and A. Santis, Forensically-Sound Methods to Collect Live Network Evidence, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), pp.405-412, 2013.
DOI : 10.1109/AINA.2013.133