Reference Subject Stakeholder type Source Keywords
Reference Subject Stakeholder type Source Keywords
ICCOE International Convention Galilean Conventions.coe.int, (2015). Council of Europe - ETS No. 185 - Convention on Cybercrime. [online] Available at: http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm convention; treaty
CDCCD Cyber Definitions Galilean CCDCOE, (2014). Cyber Definitions. [online] Available at: https://ccdcoe.org/cyber-definitions.html cyber definitions
MEAND Metrics Galilean Anderson, P. (2012). Measuring the Cost of Cybercrime. [online] Available at: http://weis2012.econinfosec.org/papers/Anderson_WEIS2012 cost of cybercrime
MERAN Metrics Phenomenalist ABLON, L., LIBICKI, M. C. and GOLAY, A. A. (2014). Markets for Cybercrime Tools and Stolen Data. RAND National Research Division. [online] Available at: http://www.rand.org/pubs/research_reports/RR610.html economic analysis; black markets
MEACF Metrics Phenomenalist McAfee Inc., & Center for Strategic & International Studies (CSIS), (2014). Net Losses: Estimating the Global Cost of Cybercrime Economic Impact of Cybercrime II. [online] Available at: http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf cost of cybercrime; economic
MEPON Metrics Galilean Ponemon Institute, (2014). 2014 Global Report on the Cost of Cyber Crime. [online] Sponsored by HP Enterprise Security. Available at: http://www8.hp.com/us/en/software-solutions/ponemon-cyber-security-report/index.html?jumpid=va_mq32xtevyi cost of cybercrime
MEECO Metrics Aristotelian The Economist (2014), Estimating the cost of cybercrime. (2014). Booz Allen Hamilton Inc. Available at: http://www.economistinsights.com/technology-innovation/analysis/measuring-cost-cybercrime/custom cost of cybercrime
MEIBM Metrics Phenomenalist IBM 2014 Cyber Security Intelligence Index May 2014. (2014). Available at: http://www-935.ibm.com/services/image/Infographic_2014-Cyber-Security-Intelligence-Index.png cyber security
METRU Metrics Phenomenalist Trustwave, (2014). 2014 Trustwave Global Security Report. [online] Available at: https://www.trustwave.com/Resources/Trustwave-Blog/The-2014-Trustwave-Global-Security-Report-Is-Here global security
MELEV Metrics Galilean Levi, M. and WIlliams, M. (2012). eCrime Reduction Partnership Mapping Study. [online] Available at: http://www.cardiff.ac.uk/socsi/resources/Levi%20Williams%20eCrime%20Reduction%20Partnership%20Mapping%20Study.pdf ecrime
MEHUA Metrics Galilean Hua, J. and Bapna, S. (2013). The economic impact of cyber terrorism. The Journal of Strategic Information Systems, 22(2), pp.175-186. cyner terrorism
MEEWI Metrics Galilean EastWest Institute, (2013). Measuring the Cybersecurity Problem. [online] Available at: http://www.ewi.info/idea/measuring-cybersecurity-problem measuring
MEUMA Metrics Galilean Uma, M. and Padmavathi, G. (2013). A Survey on Various Cyber Attacks and their Classification. International Journal of Network Security, [online] Vol.15 (No.5), pp.PP.390-396. Available at: http://ijns.femto.com.tw cyber attacks; classification
GTFSE General Threat Phenomenalist F-Secure, (2014). Threat Reports. [online] Available at: https://www.f-secure.com/en/web/labs_global/whitepapers threats
GTEUR General Threat Galilean Europol, (2014). The Internet Organised Crime Threat Assessment (iOCTA). [online] Available at: https://www.europol.europa.eu/sites/default/files/publications/europol_iocta_web.pdf organised crime
GTMCA General Threat Phenomenalist McAfee Labs, (2014). Threat Report Q2 2014. RP Quarterly Threat Reports. [online] Available at: http://www.mcafee.com/uk/resources/reports/rp-quarterly-threat-q2-2014.pdf threats
GEMCA General Threat Phenomenalist McAfee Labs. (2015). [Blog] Blog Central. Available at: https://blogs.mcafee.com/category/mcafee-labs threats
GTGRI General Threat Galilean Gritzalis, D., Stavrou, V., Kandias, M. and Stergiopoulos, G. (2014). Insider Threat: Enhancing BPM through Social Media. 2014 6th International Conference on New Technologies, Mobility and Security (NTMS). threats
GTPRE General Threat Galilean Preneel, B. (2014). The Future of Information Security Research: Cryptology and Beyond. Secure Data Management, pp.23-27. cryptology; data
GTSUN General Threat Galilean Sun, Y., Zhang, J., Xiong, Y. and Zhu, G. (2014). Data Security and Privacy in Cloud Computing. International Journal of Distributed Sensor Networks, 2014, pp.1-9. data security; privacy
GTTRE General Threat Phenomenalist Trendmicro.com, (2015). Threat Reports and Security Predictions - Trend Micro USA. [online] Available at: http://www.trendmicro.com/us/security-intelligence/research-and-analysis/threat-reports/index.html threats
GTKAS General Threat Phenomenalist Kaspersky Labs, (2015). Cyberthreat Real-Time Map. [online] Available at: http://cybermap.kaspersky.com/ cyberthreats
GTCAP General Threat Galilean Capec.mitre.org, (2015). CAPEC - CAPEC-3000: Domains of Attack (Version 2.6) Available at: https://capec.mitre.org/data/definitions/3000.html threats; attack
GECAP General Threat Galilean Capec.mitre.org, (2015). CAPEC - CAPEC-1000: Mechanisms of Attack (Version 2.6) Available at: https://capec.mitre.org/data/definitions/1000.html threats; attack
THCAP General Threat Galilean Capec.mitre.org, (2015). CAPEC - Common Attack Pattern Enumeration and Classification. Available at: https://capec.mitre.org/ threats; attack
GTSIM General Threat Galilean Simmons, C., Ellis, C., Shiva, S., Dasgupta, D. and Wu, Q. (2009). AVOIDIT: A Cyber Attack Taxonomy. Available at: http://gtcs.cs.memphis.edu/index.php?c=publications attack; taxonomy
MTTRE Mobile Threats Phenomenalist Trend Micro Research, (2014). The Mobile Cybercriminal Underground Market in China. Cybercriminal Underground Economy Series. [online] Available at: http://blog.trendmicro.com/trendlabs-security-intelligence/the-mobile-cybercriminal-underground-market-in-china/ mobiles; cybercriminal
MTXIN Mobile Threats Galilean Xing, L., Pan, X., Wangi, R., Yuan, K. and Wang, X. (2014). Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vulnerable. [online] Secureandroidupdate.org. Available at: http://secureandroidupdate.org/ mobiles; vulnerability
MTFSE Mobile Threats Phenomenalist F-secure.com, (2015). Threat Report Whitepapers. [online] Available at: https://www.f-secure.com/en/web/labs_global/whitepapers threats
MTAPW Mobile Threats Phenomenalist APWG (Anti-Phishing Working Group), (2013). Mobile Financial Fraud & The Underground Marketplace. Jart Armin & Andrey Kamerov, Anti-Phishing Mobile Working Group. [online] Available at: http://www.antiphishing.org/resources/mobile/ mobiles; underground
MTSYM Mobile Threats Phenomenalist Symantec, (2013). Mobile Adware and Malware Analysis. [online] Available at: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/madware_and_malware_analysis.pdf [Accessed 5 Mar. 2015]. mobiles; adware
MTDIN Mobile Threats Galilean Dinesh, A. (2014). An Analysis of Mobile Malware and Detection Techniques. [online] Available at: https://tuftsdev.github.io/DefenseOfTheDarkArts/students_works/final_project/fall2013/adinesh.pdf mobiles; malware
MTLAP Mobile Threats Galilean La Polla, M., Martinelli, F. and Sgandurra, D. (2013). A Survey on Security for Mobile Devices. IEEE Commun. Surv. Tutorials, 15(1), pp.446-471 mobiles; security
BWAN Botnets Galilean Wang, P., Wu, L., Aslam, B. and Zou, C. (2009). A Systematic Study on Peer-to-Peer Botnets. 2009 Proceedings of 18th International Conference on Computer Communications and Networks. botnets
BMNE Botnets Phenomenalist Mnemonic.no, (2015). Banking Trojan White Papers. [online] Available at: http://www.mnemonic.no/en/Andre-sprak/English/Seminars-and-articles/Banking-Trojan-White-Papers/ trojan; banking
BOALO Botnets Galilean Alomari, E., Manickam, S., Gupta, B., Singh, P. and Anbar, M. (2014). Design, deployment and use of HTTP-based botnet (HBB) testbed. 16th International Conference on Advanced Communication Technology botnets
BOARB Botnets Phenomenalist Arbornetworks.com, (2015). White Papers - Arbor Networks. [online] Available at: http://www.arbornetworks.com/14-research/4466-white-papers botnets; threats
BOSAN Botnets Phenomenalist Sancho, D. and Link, R. (2012). Trend Micro Sinkholes and Eliminates a ZeuS Botnet C&C, Malware Blog, Trend Micro. [online] Blog.trendmicro.com. Available at: http://blog.trendmicro.com/trendlabs-security-intelligence/trend-micro-sinkholes-and-eliminates-a-zeus-botnet-cc/ botnets; sinkhole
CIMCC Critical Infrastructures Galilean McConnell, B. and Austin, G. (2014). A Measure of Restraint in Cyberspace Reducing Risk to Civilian Nuclear Assets. [online] Ewi.info. Available at: http://www.ewi.info/idea/measure-restraint-cyberspace critical infrastructures; assets
CIICS Critical Infrastructures Galilean Transportation Sector Working Group, (2012). Roadmap to Secure Control Systems in the Transportation Sector. [online] Available at: https://ics-cert.us-cert.gov/sites/default/files/ICSJWG-Archive/TransportationRoadmap20120831.pdf transportation; critical infrastructures
CINIS Critical Infrastructures Galilean National Institute of Standards and Technology (NIST), (2014). Improving Critical Infrastructure Cybersecurity. U.S. Department of Commerce. cybersecurity; critical infrastructures
CICHA Critical Infrastructures Galilean Chatham House, (2011). Cyber Security and the UK.s Critical National Infrastructure. [online] Available at: http://www.chathamhouse.org/publications/papers/view/178171 critical infrastructures
CIJAN Critical Infrastructures Galilean Janke, R., Tryby, M. and Clark, R. (2013). Protecting Water Supply Critical Infrastructure: An Overview. Securing Water and Wastewater Systems, pp.29-85. critical infrastructures; water
CIBYR Critical Infrastructures Phenomenalist Byres, E. (2012). 7 Steps to ICS and SCADA Security. [Blog] Available at: https://www.tofinosecurity.com/blog/7-steps critical infrastructures; scada
CIMEU Critical Infrastructures Galilean Meunier, P. (2007). Classes of Vulnerabilities and Attacks. Wiley Handbook of Science and Technology for Homeland Security, CS03. Available at: http://homes.cerias.purdue.edu/~pmeunier/aboutme/classes_vulnerabilities.pdf critical infrastructures; vulnerability
DBMIC Data Breaches Phenomenalist Microsoft, (2012). Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft, Version 1 and 2. [online] Available at: http://www.microsoft.com/en-gb/download/details.aspx?id=36036 pass the hash; attacks
DBVER Data Breaches Phenomenalist Verizon Enterprise Solutions (2015). Data Breach Investigations Report. [online]. Available at: http://www.verizonenterprise.com/DBIR/ DATA BREACH data breach
DBGEM Data Breaches Phenomenalist Gemalto Releases Findings of 2014 Breach Level Index. (2015). [Blog] Available at: http://www.gemalto.com/press/Pages/Gemalto-Releases-Findings-of-2014-Breach-Level-Index.aspx data breach
DBENI Data Breaches Galilean ENISA, (2012). Data breach notifications in the EU. [online] ENISA. Available at: http://www.enisa.europa.eu/activities/identity-and-trust/trust-services/reports data breach
DBWOR Data Breaches Aristotelian World Law Group, (2015). Global Data Breach Guide. [online] Available at: http://www.theworldlawgroup.com/wlg/global_data_breach_guide_home.asp data breach
DBCMD Data Breaches Galilean Center for Media, Data and Society School of Public Policy Central European University, (2014). Data Breaches in Europe: Reported Breaches of Compromised Personal Records in Europe, 2005.2014. [online] Available at: http://cmds.ceu.edu/article/2014-10-07/data-breaches-europe-reported-breaches-compromised-personal-records-europe-2005 data breach
DBJAV Data Breaches Phenomenalist Javelinstrategy.com, (2015). Javelin Strategy - 2015 IDENTITY FRAUD: Protecting Vulnerable Populations. [online] Available at: https://www.javelinstrategy.com/brochure/347#DownloadReport data breach
DDPRO DDoS Phenomenalist Prolexic, (2015). Attack Trends and Statistics, State of the Internet. Cybersecurity. [online] Available at: http://www.stateoftheinternet.com/security-cybersecurity-attack-trends-and-statistics.html DDoS; attack
DDGOO DDoS Phenomenalist Google Ideas & Arbor Networks, (2015). Digital Attack Map. [online] Available at: http://www.digitalattackmap.com/ DDoS; attack
DDVER DDoS Phenomenalist Verisigninc.com, (2015). DDoS Report and DDoS Attack Trends, Verisign. [online] Available at: https://www.verisigninc.com/en_US/cyber-security/ddos-protection/ddos-report/index.xhtml DDoS; attack
DDRAD DDoS Phenomenalist Radware.com, (2015). DDoS and Security Reports and Research | Radware Security. [online] Available at: http://security.radware.com/ DDoS; security
DDNEU DDoS Phenomenalist Neustar, (2015). Annual DDoS Attacks and Impact Report. [online] Available at: http://hello.neustar.biz/2014ddosreport_it_security_lp.html DDoS; attack
MARED Malware Phenomenalist Redsocks, (2015). Malware Trend Report. Quarterly Malware Trend Report. [online] Available at: http://www.redsocks.nl/en/downloads/ malware
MACYD Malware Phenomenalist Globalsecuritymap.com, (2015). Global Security Map. CyberDefcon[online] Available at: http://globalsecuritymap.com/ malware; threats
MAMIC Malware Phenomenalist Microsoft.com, (2015). Microsoft Malware Protection Center - threat reports. [online] Available at: http://www.microsoft.com/security/portal/mmpc/research/researchpapers.aspx malware; threats
MASOP Malware Phenomenalist Sophos, (2014). Our top 10 predictions for security threats in 2015 and beyond | Sophos Blog. [online] Available at: http://blogs.sophos.com/2014/12/11/our-top-10-predictions-for-security-threats-in-2015-and-beyond/ malware; security
MACAB Malware Galilean Caballero, J., Grier, C., Kreibich, C. and Paxson, V. (2011). Measuring Pay-per-Install: The Commoditization of Malware Distribution. Available: https://software.imdea.org/~juanca/papers/ppi_usenixsec11.pdf malware; pay-per-install
MANIS Malware Galilean Nist.gov, (2015). Publications Portal. Guide to Malware Incident Prevention and Handling, National Institute of Standards and Technology. Available at: http://www.nist.gov/publication-portal.cfm malware; NIST
MAVIR Malware Phenomenalist Virusbtn.com, (2015). Virus Bulletin : Monthly magazine featuring in-depth malware analysis, new hoax listings, spam supplement and more. [online] Available at: https://www.virusbtn.com/virusbulletin/index malware; spam
MAESE Malware Phenomenalist Eset.com, (2015). ESET Threat Center | New Malware Threats Report. [online] Available at: http://www.eset.com/us/threat-center/ malware; threats
MASEC Malware Phenomenalist SecureList blog. Equation: The Death Star of Malware Galaxy. (2015). [Blog] Available at: https://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/ malware; equation
MAMCI Malware Galilean McIntire, D. and Mundie, D. (2013). The MAL: A Malware Analysis Lexicon. [online] Software Engineering Institute. Available at: http://repository.cmu.edu/sei?utm_source=repository.cmu.edu%2Fsei%2F730&utm_medium=PDF&utm_campaign=PDFCoverPages malware
EXHOS Exploits Phenomenalist Hostexploit, (2015). World Hosts Reports. [online] Available at: http://hostexploit.com/downloads/viewcategory/7-public-reports.html exploits; hosts
EXCYB Exploits Phenomenalist CyberArk, (2015). Privilege Account Exploits - White Paper - CyberArk. [online] Available at: http://www.cyberark.com/resources/white-paper/ exploits
EXCIS Exploits Phenomenalist Cisco, (2015). Cisco Security Reports. [online] Available at: http://www.cisco.com/c/en/us/products/security/annual_security_report.html exploits; security
VIVIR Viruses Phenomenalist virustotal.com, (2015). [online] Virus Total Blog. Available at: http://blog.virustotal.com virus
VISYM Viruses Phenomenalist Symantec.com, (2015). Virus Definitions & Security Updates - Symantec Corp.. [online] Available at: http://www.symantec.com/security_response/definitions.jsp virus
VIBIT Viruses Phenomenalist Bitdefender.com, (2015). Latest Virus Threats - Bitdefender Real-Time Virus Reporting. [online] Available at: http://www.bitdefender.com/resourcecenter/real-time-reporting virus
VIAVC Viruses Phenomenalist AV-Comparatives, (2015). Independent Tests of Anti-Virus Software - AV-Comparatives. [online] Available at: http://www.av-comparatives.org/ virus
VIVBU Viruses Phenomenalist Virusbtn.com, (2015). Virus Bulletin : The Virus Bulletin prevalence table. [online] Available at: https://www.virusbtn.com/resources/malwareDirectory/prevalence/2013/index?current virus
DNKUR DNS Galilean Kurbalija, J. (2014). There is a practical solution for global inviolability of the Internet root zone. [online] Diplo Foundation. Available at: http://www.diplomacy.edu/policybriefs DNS
DNSAN DNS Galilean SANS Institute, (2014). Securing DNS to Thwart Advanced Targeted Attacks and Reduce Data Breaches. [online] SANS Institute. Available at: https://www.sans.org/reading-room/analysts-program DNS; attack
DNOFC DNS Aristotelian InterConnect Communications, (2011). Domain Name System Security Extensions Deployment. [online] OFCOM. Available at: http://stakeholders.ofcom.org.uk/binaries/internet/domain-name-security.pdf DNS; security
DNOPE DNS Phenomenalist OpenDNS, (2015). Sharing Intelligence and Distributing Enforcement Everywhere,. [online] OpenDNS. Available at: https://www.opendns.com/enterprise-security/resources/white-papers/common-sense-common-defense-sharing-intelligence-distributing-enforcement-everywhere/ DNS
DNICA DNS Aristotelian ICANN DNS Security and Stability Working Group, (2013). DNS Security and Stability Analysis. Final Report. [online] Available at: http://ccnso.icann.org/workinggroups/dssa-wg.htm DNS; security
DNSON DNS Galilean Son, S. and Shmatikov, V. (2012). The Hitchhiker.s Guide to DNS Cache Poisoning. [online] The University of Texas at Austin. Available at: http://www.cs.utexas.edu/~shmat/shmat_securecomm10.pdf DNS; cache poisoning
EXCPN Exfiltration Galilean Academic Centre of Excellence in Cyber Security Research, University of Lancaster, (2014). Detecting and Preventing Data Exfiltration. [online] University of Lancaster. Available at: https://www.cpni.gov.uk/advice/cyber/idata/Data-Exfiltration-Lancaster/ exfiltration; data
EXCRU Exfiltration Phenomenalist Cruz, M. (2014). Data Exfiltration in Targeted Attacks. [Blog] Trend Labs Security Intelligence Blog. Available at: http://blog.trendmicro.com/trendlabs-security-intelligence/data-exfiltration-in-targeted-attacks/ exfiltration; data
EXSIL Exfiltration Galilean Silowash, G., Lewellen, T., Burns, J. and Costa, D. (2015). Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection. [online] Software Engineering Institute. Available at: http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=40224 exfiltration; data
SPSEC Spam Phenomenalist Securelist.com, (2015). Archive: All - Securelist. [online] Available at: https://securelist.com/all/?category=440 spam
SPQIA Spam Galilean Qian, Z., Mao, Z., Xie, Y. and Yu, F. (2010). Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. 2010 IEEE Symposium on Security and Privacy. spam
PHAPW Phishing Phenomenalist APWG (Anti-Phishing Working Group), (2015). APWG Phishing Reports | APWG. [online] Available at: http://www.antiphishing.org/resources/apwg-reports/ phishing
PHTRE Phishing Phenomenalist Trendmicro.com. Spear-Phishing Email: Most Favored APT Attack Bait. Available at:http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-spear-phishing-email-most-favored-apt-attack-bait.pdf phishing; APT
PHEMC Phishing Phenomenalist Uk.emc.com, (2015). RSA FraudAction 360 - Pharming, Phishing - EMC. [online] Available at: http://uk.emc.com/security/rsa-fraud-prevention/rsa-fraudaction.htm#!resources phishing
CFJOH Cyber Forensics Galilean Johnson, T. (2006). Forensic computer crime investigation. Boca Raton: CRC, Taylor & Francis forensics; computer
CFGAR Cyber Forensics Galilean Garrie, D. and Morrissy, J. (2014). Digital Forensic Evidence in the Courtroom: Understanding Content and Quality. [online] Scholarlycommons.law.northwestern.edu. Available at: http://scholarlycommons.law.northwestern.edu/njtip/vol12/iss2/5/ forensics
CFNIS Cyber Forensics Galilean Nist.gov, (2015). Guide to Integrating Forensic Techniques into Incident Response Recommendations of the National Institute of Standards and Technology Special Publication 800-86. Publications Portal. Available at: http://www.nist.gov/publication-portal.cfm forensics; incident response
CTJAR Cyber Terrorism Galilean Jarvis, L., Macdonald, S. and Nouri, L. (2013). The Cyberterrorism Threat: Findings from a Survey of Researchers. Studies in Conflict & Terrorism, 37(1), pp.68-90. cyber terrorism; threats
CTWEI Cyber Terrorism Galilean WEIMANN, G. (2005). Cyberterrorism: The Sum of All Fears? Studies in Conflict & Terrorism, 28(2), pp.129-149. cyber terrorism
PRUNI Hacker & Criminal Profiling Galilean UNICRI, Amapola, Technical University of Berlin TUB, Tilburg Institute for Law, Technology and Society TILT, Romanian Center for European Policies CRPE, (2014). Profiling Final Report. Profiling Project. [online] Available at: http://www.unicri.it/news/files/Profiling_final_report_2014.pdf hacker profiling
PRNEW Hacker & Criminal Profiling Galilean Newsecuritylearning.com, (2014). The need for a comprehensive methodology for profiling cyber-criminals. [online] Available at: http://www.newsecuritylearning.com/index.php/feature/150-the-need-for-a-comprehensive-methodology-for-profiling-cyber-criminals cybercriminal profiling
PRSHI Hacker & Criminal Profiling Aristotelian Shinder, D. (2010). Profiling and categorizing cybercriminals. [online] TechRepublic. Available at: http://www.techrepublic.com/blog/it-security/profiling-and-categorizing-cybercriminals/ cybercriminal profiling
HCUNI Hacker & Criminal Profiling Galilean Unicri.it, (2006). Hackers Profiling. [online] Available at: http://www.unicri.it/special_topics/securing_cyberspace/current_and_past_activities/hackers_profiling/ cybercriminal profiling
PRWAR Hacker & Criminal Profiling Galilean Warikoo, A. (2014). Proposed Methodology for Cyber Criminal Profiling. Information Security Journal: A Global Perspective, 23(4-6), pp.172-178. cybercriminal profiling
PRHAR Hacker & Criminal Profiling Galilean Hargreaves, C. and Prince, D. (2013). Understanding cyber criminals and measuring their future activity. [online] EPSRC-GCHQ Academic Centre of Excellence in Cyber Security Research Lancaster University. Available at: http://eprints.lancs.ac.uk/65477/1/Final_version_Understanding_cyber_criminals_and_measuring_their_activity.pdf cybercriminal profiling
PRKIR Hacker & Criminal Profiling Galilean Kirwan, G. and Power, A. (n.d.).(2013). Cybercrime, The Psychology of Online Offenders. ISBN: 9781107004443 cybercriminal profiling
PRWOR Hacker & Criminal Profiling Galilean Wori, O. (2014). Computer Crimes: Factors of Cybercriminal Activities. International Journal of Advanced Computer Science and Information Technology, [online] 3(1), pp.pp. 51-67. Available at: http://technical.cloud-journals.com/index.php/IJACSIT/article/view/Tech-136 cybercriminal profiling
PRJUM Hacker & Criminal Profiling Phenomenalist Jumio.com, (2013). Infographic: The Profile of a Cyber Criminal - Jumio. [online] Available at: https://www.jumio.com/2013/02/infographic-the-profile-of-a-cyber-criminal/ cybercriminal profiling
VPKAS Cyber Espionage Phenomenalist Kaspersky.com, (2015). Equation Group: The Crown Creator of Cyber-Espionage | Kaspersky Lab. [online] Available at: http://www.kaspersky.com/about/news/virus/2015/equation-group-the-crown-creator-of-cyber-espionage cyber espionage; equation
POEWI Policy Galilean EastWest Institute, (2014). Achieving Breakthroughs Global Cooperation in Cyberspace Initiative, July 2014. [online] Available at: http://www.ewi.info/idea/world-cyberspace-cooperation-summit-event-report-released cooperation
GACCD Policy Galilean CCDOE NATO Cooperative Cyber Defence Centre of Excellence, (2012). National Cyber Security Framework Manual. [online] CCDOE. Available at: https://ccdcoe.org/multimedia/national-cyber-security-framework-manual.html cyber security; framework
LANAT Law & Legal Phenomenalist NATO CCDCoE & ENISA (Joint Report), (2012). Legal Implications of Countering Botnets. [online] Available at: https://ccdcoe.org/reports-articles.html botnets
LASCH Law & Legal Phenomenalist Schmitt, M. and Vihul, L. (2014). Proxy Wars in Cyberspace: The Evolving International Law of Attribution. [online] Fletcher Security Review. Review Vol I(Issue II Spring 2014) Available at: http://www.fletchersecurity.org/#!schmitt-and-vihul/cyhm attribution
LAMEL Law & Legal Galilean Mele, S. (2013). Cyber-Weapons: Legal and Strategic Aspects (Version 2.0). SSRN Journal. [online] Available at: http://ssrn.com/abstract=2518212 cyber weapons
NCAUS National Cybercrime Strategies Galilean Australian National Plan to Combat Cybercrime. (2015). Available at: https://www.ag.gov.au/CrimeAndCorruption/Cybercrime/Documents/national-plan-to-combat-cybercrime.pdf national security
NCEST National Cybercrime Strategies Galilean Estonia Cyber Security Strategy for 2014 - 2017. (2014). Available at: https://www.mkm.ee/en/objectives-activities/information-society/cyber-security national security
NCIND National Cybercrime Strategies Galilean India National Cyber Security Policy-2013. (2013). 1st ed. [ebook] Available at: http://deity.gov.in/content/national-cyber-security-policy-2013-1 national security
NCITA National Cybercrime Strategies Galilean Italy National Strategic Framework for Cyberspace Security. (2013). Presidency of the Council Of Ministers. Available at: https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/IT_NCSS.pdf national security
NCUSA National Cybercrime Strategies Galilean U.S. International Strategy for Cyberspace. (2011). Available at: http://www.whitehouse.gov/sites/default/files/rss_viewer/internationalstrategy_cyberspace.pdf national security
NCUK National Cybercrime Strategies Galilean UK Cyber Security Strategy. (2014). Available at: https://www.gov.uk/government/publications/cyber-security-strategy national security
NCGER National Cybercrime Strategies Galilean Germany Cyber Security Strategy. (2011). Available at: https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/national-cyber-security-strategies-in-the-world national security
STFIR Standards & Best Practices Phenomenalist First.org, (2015). FIRST.org / Security Library / Best Practices Guide (BPGL). [online] Available at: http://www.first.org/resources/guides best practices
STISO Standards & Best Practices Galilean Iso.org, (2012). ISO/IEC 27035:2011 - Information technology -- Security techniques -- Information security incident management. [online] Available at: http://www.iso.org/iso/catalogue_detail?csnumber=44379 security techniques
SBISO Standards & Best Practices Galilean Iso.org, (2015). International Standard ISO/IEC 27032. [online] Available at: https://www.iso.org/obp/ui/#iso:std:iso-iec:27032:ed-1:v1:en international standards
ENISA ENISA Phenomenalist Enisa.europa.eu, (2015). Publications ENISA. Available at: https://www.enisa.europa.eu/ ENISA
NIST NIST Galilean Nist.gov, (2015). Publications Portal. Available at: http://www.nist.gov/publication-portal.cfm NIST