Reference Subject Stakeholder type Source Keywords
Reference Subject Stakeholder type Source Keywords
ICCOE International Convention Galilean, (2015). Council of Europe - ETS No. 185 - Convention on Cybercrime. [online] Available at: convention; treaty
CDCCD Cyber Definitions Galilean CCDCOE, (2014). Cyber Definitions. [online] Available at: cyber definitions
MEAND Metrics Galilean Anderson, P. (2012). Measuring the Cost of Cybercrime. [online] Available at: cost of cybercrime
MERAN Metrics Phenomenalist ABLON, L., LIBICKI, M. C. and GOLAY, A. A. (2014). Markets for Cybercrime Tools and Stolen Data. RAND National Research Division. [online] Available at: economic analysis; black markets
MEACF Metrics Phenomenalist McAfee Inc., & Center for Strategic & International Studies (CSIS), (2014). Net Losses: Estimating the Global Cost of Cybercrime Economic Impact of Cybercrime II. [online] Available at: cost of cybercrime; economic
MEPON Metrics Galilean Ponemon Institute, (2014). 2014 Global Report on the Cost of Cyber Crime. [online] Sponsored by HP Enterprise Security. Available at: cost of cybercrime
MEECO Metrics Aristotelian The Economist (2014), Estimating the cost of cybercrime. (2014). Booz Allen Hamilton Inc. Available at: cost of cybercrime
MEIBM Metrics Phenomenalist IBM 2014 Cyber Security Intelligence Index May 2014. (2014). Available at: cyber security
METRU Metrics Phenomenalist Trustwave, (2014). 2014 Trustwave Global Security Report. [online] Available at: global security
MELEV Metrics Galilean Levi, M. and WIlliams, M. (2012). eCrime Reduction Partnership Mapping Study. [online] Available at: ecrime
MEHUA Metrics Galilean Hua, J. and Bapna, S. (2013). The economic impact of cyber terrorism. The Journal of Strategic Information Systems, 22(2), pp.175-186. cyner terrorism
MEEWI Metrics Galilean EastWest Institute, (2013). Measuring the Cybersecurity Problem. [online] Available at: measuring
MEUMA Metrics Galilean Uma, M. and Padmavathi, G. (2013). A Survey on Various Cyber Attacks and their Classification. International Journal of Network Security, [online] Vol.15 (No.5), pp.PP.390-396. Available at: cyber attacks; classification
GTFSE General Threat Phenomenalist F-Secure, (2014). Threat Reports. [online] Available at: threats
GTEUR General Threat Galilean Europol, (2014). The Internet Organised Crime Threat Assessment (iOCTA). [online] Available at: organised crime
GTMCA General Threat Phenomenalist McAfee Labs, (2014). Threat Report Q2 2014. RP Quarterly Threat Reports. [online] Available at: threats
GEMCA General Threat Phenomenalist McAfee Labs. (2015). [Blog] Blog Central. Available at: threats
GTGRI General Threat Galilean Gritzalis, D., Stavrou, V., Kandias, M. and Stergiopoulos, G. (2014). Insider Threat: Enhancing BPM through Social Media. 2014 6th International Conference on New Technologies, Mobility and Security (NTMS). threats
GTPRE General Threat Galilean Preneel, B. (2014). The Future of Information Security Research: Cryptology and Beyond. Secure Data Management, pp.23-27. cryptology; data
GTSUN General Threat Galilean Sun, Y., Zhang, J., Xiong, Y. and Zhu, G. (2014). Data Security and Privacy in Cloud Computing. International Journal of Distributed Sensor Networks, 2014, pp.1-9. data security; privacy
GTTRE General Threat Phenomenalist, (2015). Threat Reports and Security Predictions - Trend Micro USA. [online] Available at: threats
GTKAS General Threat Phenomenalist Kaspersky Labs, (2015). Cyberthreat Real-Time Map. [online] Available at: cyberthreats
GTCAP General Threat Galilean, (2015). CAPEC - CAPEC-3000: Domains of Attack (Version 2.6) Available at: threats; attack
GECAP General Threat Galilean, (2015). CAPEC - CAPEC-1000: Mechanisms of Attack (Version 2.6) Available at: threats; attack
THCAP General Threat Galilean, (2015). CAPEC - Common Attack Pattern Enumeration and Classification. Available at: threats; attack
GTSIM General Threat Galilean Simmons, C., Ellis, C., Shiva, S., Dasgupta, D. and Wu, Q. (2009). AVOIDIT: A Cyber Attack Taxonomy. Available at: attack; taxonomy
MTTRE Mobile Threats Phenomenalist Trend Micro Research, (2014). The Mobile Cybercriminal Underground Market in China. Cybercriminal Underground Economy Series. [online] Available at: mobiles; cybercriminal
MTXIN Mobile Threats Galilean Xing, L., Pan, X., Wangi, R., Yuan, K. and Wang, X. (2014). Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vulnerable. [online] Available at: mobiles; vulnerability
MTFSE Mobile Threats Phenomenalist, (2015). Threat Report Whitepapers. [online] Available at: threats
MTAPW Mobile Threats Phenomenalist APWG (Anti-Phishing Working Group), (2013). Mobile Financial Fraud & The Underground Marketplace. Jart Armin & Andrey Kamerov, Anti-Phishing Mobile Working Group. [online] Available at: mobiles; underground
MTSYM Mobile Threats Phenomenalist Symantec, (2013). Mobile Adware and Malware Analysis. [online] Available at: [Accessed 5 Mar. 2015]. mobiles; adware
MTDIN Mobile Threats Galilean Dinesh, A. (2014). An Analysis of Mobile Malware and Detection Techniques. [online] Available at: mobiles; malware
MTLAP Mobile Threats Galilean La Polla, M., Martinelli, F. and Sgandurra, D. (2013). A Survey on Security for Mobile Devices. IEEE Commun. Surv. Tutorials, 15(1), pp.446-471 mobiles; security
BWAN Botnets Galilean Wang, P., Wu, L., Aslam, B. and Zou, C. (2009). A Systematic Study on Peer-to-Peer Botnets. 2009 Proceedings of 18th International Conference on Computer Communications and Networks. botnets
BMNE Botnets Phenomenalist, (2015). Banking Trojan White Papers. [online] Available at: trojan; banking
BOALO Botnets Galilean Alomari, E., Manickam, S., Gupta, B., Singh, P. and Anbar, M. (2014). Design, deployment and use of HTTP-based botnet (HBB) testbed. 16th International Conference on Advanced Communication Technology botnets
BOARB Botnets Phenomenalist, (2015). White Papers - Arbor Networks. [online] Available at: botnets; threats
BOSAN Botnets Phenomenalist Sancho, D. and Link, R. (2012). Trend Micro Sinkholes and Eliminates a ZeuS Botnet C&C, Malware Blog, Trend Micro. [online] Available at: botnets; sinkhole
CIMCC Critical Infrastructures Galilean McConnell, B. and Austin, G. (2014). A Measure of Restraint in Cyberspace Reducing Risk to Civilian Nuclear Assets. [online] Available at: critical infrastructures; assets
CIICS Critical Infrastructures Galilean Transportation Sector Working Group, (2012). Roadmap to Secure Control Systems in the Transportation Sector. [online] Available at: transportation; critical infrastructures
CINIS Critical Infrastructures Galilean National Institute of Standards and Technology (NIST), (2014). Improving Critical Infrastructure Cybersecurity. U.S. Department of Commerce. cybersecurity; critical infrastructures
CICHA Critical Infrastructures Galilean Chatham House, (2011). Cyber Security and the UK.s Critical National Infrastructure. [online] Available at: critical infrastructures
CIJAN Critical Infrastructures Galilean Janke, R., Tryby, M. and Clark, R. (2013). Protecting Water Supply Critical Infrastructure: An Overview. Securing Water and Wastewater Systems, pp.29-85. critical infrastructures; water
CIBYR Critical Infrastructures Phenomenalist Byres, E. (2012). 7 Steps to ICS and SCADA Security. [Blog] Available at: critical infrastructures; scada
CIMEU Critical Infrastructures Galilean Meunier, P. (2007). Classes of Vulnerabilities and Attacks. Wiley Handbook of Science and Technology for Homeland Security, CS03. Available at: critical infrastructures; vulnerability
DBMIC Data Breaches Phenomenalist Microsoft, (2012). Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft, Version 1 and 2. [online] Available at: pass the hash; attacks
DBVER Data Breaches Phenomenalist Verizon Enterprise Solutions (2015). Data Breach Investigations Report. [online]. Available at: DATA BREACH data breach
DBGEM Data Breaches Phenomenalist Gemalto Releases Findings of 2014 Breach Level Index. (2015). [Blog] Available at: data breach
DBENI Data Breaches Galilean ENISA, (2012). Data breach notifications in the EU. [online] ENISA. Available at: data breach
DBWOR Data Breaches Aristotelian World Law Group, (2015). Global Data Breach Guide. [online] Available at: data breach
DBCMD Data Breaches Galilean Center for Media, Data and Society School of Public Policy Central European University, (2014). Data Breaches in Europe: Reported Breaches of Compromised Personal Records in Europe, 2005.2014. [online] Available at: data breach
DBJAV Data Breaches Phenomenalist, (2015). Javelin Strategy - 2015 IDENTITY FRAUD: Protecting Vulnerable Populations. [online] Available at: data breach
DDPRO DDoS Phenomenalist Prolexic, (2015). Attack Trends and Statistics, State of the Internet. Cybersecurity. [online] Available at: DDoS; attack
DDGOO DDoS Phenomenalist Google Ideas & Arbor Networks, (2015). Digital Attack Map. [online] Available at: DDoS; attack
DDVER DDoS Phenomenalist, (2015). DDoS Report and DDoS Attack Trends, Verisign. [online] Available at: DDoS; attack
DDRAD DDoS Phenomenalist, (2015). DDoS and Security Reports and Research | Radware Security. [online] Available at: DDoS; security
DDNEU DDoS Phenomenalist Neustar, (2015). Annual DDoS Attacks and Impact Report. [online] Available at: DDoS; attack
MARED Malware Phenomenalist Redsocks, (2015). Malware Trend Report. Quarterly Malware Trend Report. [online] Available at: malware
MACYD Malware Phenomenalist, (2015). Global Security Map. CyberDefcon[online] Available at: malware; threats
MAMIC Malware Phenomenalist, (2015). Microsoft Malware Protection Center - threat reports. [online] Available at: malware; threats
MASOP Malware Phenomenalist Sophos, (2014). Our top 10 predictions for security threats in 2015 and beyond | Sophos Blog. [online] Available at: malware; security
MACAB Malware Galilean Caballero, J., Grier, C., Kreibich, C. and Paxson, V. (2011). Measuring Pay-per-Install: The Commoditization of Malware Distribution. Available: malware; pay-per-install
MANIS Malware Galilean, (2015). Publications Portal. Guide to Malware Incident Prevention and Handling, National Institute of Standards and Technology. Available at: malware; NIST
MAVIR Malware Phenomenalist, (2015). Virus Bulletin : Monthly magazine featuring in-depth malware analysis, new hoax listings, spam supplement and more. [online] Available at: malware; spam
MAESE Malware Phenomenalist, (2015). ESET Threat Center | New Malware Threats Report. [online] Available at: malware; threats
MASEC Malware Phenomenalist SecureList blog. Equation: The Death Star of Malware Galaxy. (2015). [Blog] Available at: malware; equation
MAMCI Malware Galilean McIntire, D. and Mundie, D. (2013). The MAL: A Malware Analysis Lexicon. [online] Software Engineering Institute. Available at: malware
EXHOS Exploits Phenomenalist Hostexploit, (2015). World Hosts Reports. [online] Available at: exploits; hosts
EXCYB Exploits Phenomenalist CyberArk, (2015). Privilege Account Exploits - White Paper - CyberArk. [online] Available at: exploits
EXCIS Exploits Phenomenalist Cisco, (2015). Cisco Security Reports. [online] Available at: exploits; security
VIVIR Viruses Phenomenalist, (2015). [online] Virus Total Blog. Available at: virus
VISYM Viruses Phenomenalist, (2015). Virus Definitions & Security Updates - Symantec Corp.. [online] Available at: virus
VIBIT Viruses Phenomenalist, (2015). Latest Virus Threats - Bitdefender Real-Time Virus Reporting. [online] Available at: virus
VIAVC Viruses Phenomenalist AV-Comparatives, (2015). Independent Tests of Anti-Virus Software - AV-Comparatives. [online] Available at: virus
VIVBU Viruses Phenomenalist, (2015). Virus Bulletin : The Virus Bulletin prevalence table. [online] Available at: virus
DNKUR DNS Galilean Kurbalija, J. (2014). There is a practical solution for global inviolability of the Internet root zone. [online] Diplo Foundation. Available at: DNS
DNSAN DNS Galilean SANS Institute, (2014). Securing DNS to Thwart Advanced Targeted Attacks and Reduce Data Breaches. [online] SANS Institute. Available at: DNS; attack
DNOFC DNS Aristotelian InterConnect Communications, (2011). Domain Name System Security Extensions Deployment. [online] OFCOM. Available at: DNS; security
DNOPE DNS Phenomenalist OpenDNS, (2015). Sharing Intelligence and Distributing Enforcement Everywhere,. [online] OpenDNS. Available at: DNS
DNICA DNS Aristotelian ICANN DNS Security and Stability Working Group, (2013). DNS Security and Stability Analysis. Final Report. [online] Available at: DNS; security
DNSON DNS Galilean Son, S. and Shmatikov, V. (2012). The Hitchhiker.s Guide to DNS Cache Poisoning. [online] The University of Texas at Austin. Available at: DNS; cache poisoning
EXCPN Exfiltration Galilean Academic Centre of Excellence in Cyber Security Research, University of Lancaster, (2014). Detecting and Preventing Data Exfiltration. [online] University of Lancaster. Available at: exfiltration; data
EXCRU Exfiltration Phenomenalist Cruz, M. (2014). Data Exfiltration in Targeted Attacks. [Blog] Trend Labs Security Intelligence Blog. Available at: exfiltration; data
EXSIL Exfiltration Galilean Silowash, G., Lewellen, T., Burns, J. and Costa, D. (2015). Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection. [online] Software Engineering Institute. Available at: exfiltration; data
SPSEC Spam Phenomenalist, (2015). Archive: All - Securelist. [online] Available at: spam
SPQIA Spam Galilean Qian, Z., Mao, Z., Xie, Y. and Yu, F. (2010). Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. 2010 IEEE Symposium on Security and Privacy. spam
PHAPW Phishing Phenomenalist APWG (Anti-Phishing Working Group), (2015). APWG Phishing Reports | APWG. [online] Available at: phishing
PHTRE Phishing Phenomenalist Spear-Phishing Email: Most Favored APT Attack Bait. Available at: phishing; APT
PHEMC Phishing Phenomenalist, (2015). RSA FraudAction 360 - Pharming, Phishing - EMC. [online] Available at:!resources phishing
CFJOH Cyber Forensics Galilean Johnson, T. (2006). Forensic computer crime investigation. Boca Raton: CRC, Taylor & Francis forensics; computer
CFGAR Cyber Forensics Galilean Garrie, D. and Morrissy, J. (2014). Digital Forensic Evidence in the Courtroom: Understanding Content and Quality. [online] Available at: forensics
CFNIS Cyber Forensics Galilean, (2015). Guide to Integrating Forensic Techniques into Incident Response Recommendations of the National Institute of Standards and Technology Special Publication 800-86. Publications Portal. Available at: forensics; incident response
CTJAR Cyber Terrorism Galilean Jarvis, L., Macdonald, S. and Nouri, L. (2013). The Cyberterrorism Threat: Findings from a Survey of Researchers. Studies in Conflict & Terrorism, 37(1), pp.68-90. cyber terrorism; threats
CTWEI Cyber Terrorism Galilean WEIMANN, G. (2005). Cyberterrorism: The Sum of All Fears? Studies in Conflict & Terrorism, 28(2), pp.129-149. cyber terrorism
PRUNI Hacker & Criminal Profiling Galilean UNICRI, Amapola, Technical University of Berlin TUB, Tilburg Institute for Law, Technology and Society TILT, Romanian Center for European Policies CRPE, (2014). Profiling Final Report. Profiling Project. [online] Available at: hacker profiling
PRNEW Hacker & Criminal Profiling Galilean, (2014). The need for a comprehensive methodology for profiling cyber-criminals. [online] Available at: cybercriminal profiling
PRSHI Hacker & Criminal Profiling Aristotelian Shinder, D. (2010). Profiling and categorizing cybercriminals. [online] TechRepublic. Available at: cybercriminal profiling
HCUNI Hacker & Criminal Profiling Galilean, (2006). Hackers Profiling. [online] Available at: cybercriminal profiling
PRWAR Hacker & Criminal Profiling Galilean Warikoo, A. (2014). Proposed Methodology for Cyber Criminal Profiling. Information Security Journal: A Global Perspective, 23(4-6), pp.172-178. cybercriminal profiling
PRHAR Hacker & Criminal Profiling Galilean Hargreaves, C. and Prince, D. (2013). Understanding cyber criminals and measuring their future activity. [online] EPSRC-GCHQ Academic Centre of Excellence in Cyber Security Research Lancaster University. Available at: cybercriminal profiling
PRKIR Hacker & Criminal Profiling Galilean Kirwan, G. and Power, A. (n.d.).(2013). Cybercrime, The Psychology of Online Offenders. ISBN: 9781107004443 cybercriminal profiling
PRWOR Hacker & Criminal Profiling Galilean Wori, O. (2014). Computer Crimes: Factors of Cybercriminal Activities. International Journal of Advanced Computer Science and Information Technology, [online] 3(1), pp.pp. 51-67. Available at: cybercriminal profiling
PRJUM Hacker & Criminal Profiling Phenomenalist, (2013). Infographic: The Profile of a Cyber Criminal - Jumio. [online] Available at: cybercriminal profiling
VPKAS Cyber Espionage Phenomenalist, (2015). Equation Group: The Crown Creator of Cyber-Espionage | Kaspersky Lab. [online] Available at: cyber espionage; equation
POEWI Policy Galilean EastWest Institute, (2014). Achieving Breakthroughs Global Cooperation in Cyberspace Initiative, July 2014. [online] Available at: cooperation
GACCD Policy Galilean CCDOE NATO Cooperative Cyber Defence Centre of Excellence, (2012). National Cyber Security Framework Manual. [online] CCDOE. Available at: cyber security; framework
LANAT Law & Legal Phenomenalist NATO CCDCoE & ENISA (Joint Report), (2012). Legal Implications of Countering Botnets. [online] Available at: botnets
LASCH Law & Legal Phenomenalist Schmitt, M. and Vihul, L. (2014). Proxy Wars in Cyberspace: The Evolving International Law of Attribution. [online] Fletcher Security Review. Review Vol I(Issue II Spring 2014) Available at:!schmitt-and-vihul/cyhm attribution
LAMEL Law & Legal Galilean Mele, S. (2013). Cyber-Weapons: Legal and Strategic Aspects (Version 2.0). SSRN Journal. [online] Available at: cyber weapons
NCAUS National Cybercrime Strategies Galilean Australian National Plan to Combat Cybercrime. (2015). Available at: national security
NCEST National Cybercrime Strategies Galilean Estonia Cyber Security Strategy for 2014 - 2017. (2014). Available at: national security
NCIND National Cybercrime Strategies Galilean India National Cyber Security Policy-2013. (2013). 1st ed. [ebook] Available at: national security
NCITA National Cybercrime Strategies Galilean Italy National Strategic Framework for Cyberspace Security. (2013). Presidency of the Council Of Ministers. Available at: national security
NCUSA National Cybercrime Strategies Galilean U.S. International Strategy for Cyberspace. (2011). Available at: national security
NCUK National Cybercrime Strategies Galilean UK Cyber Security Strategy. (2014). Available at: national security
NCGER National Cybercrime Strategies Galilean Germany Cyber Security Strategy. (2011). Available at: national security
STFIR Standards & Best Practices Phenomenalist, (2015). / Security Library / Best Practices Guide (BPGL). [online] Available at: best practices
STISO Standards & Best Practices Galilean, (2012). ISO/IEC 27035:2011 - Information technology -- Security techniques -- Information security incident management. [online] Available at: security techniques
SBISO Standards & Best Practices Galilean, (2015). International Standard ISO/IEC 27032. [online] Available at: international standards
ENISA ENISA Phenomenalist, (2015). Publications ENISA. Available at: ENISA
NIST NIST Galilean, (2015). Publications Portal. Available at: NIST