{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T13:55:08Z","timestamp":1760622908101},"reference-count":114,"publisher":"Elsevier","isbn-type":[{"value":"9780124114746","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1016\/b978-0-12-411474-6.00025-6","type":"book-chapter","created":{"date-parts":[[2013,11,9]],"date-time":"2013-11-09T21:43:37Z","timestamp":1384033417000},"page":"423-442","source":"Crossref","is-referenced-by-count":4,"title":["A Quick Perspective on the Current State in Cybersecurity"],"prefix":"10.1016","author":[{"given":"Diogo A.B.","family":"Fernandes","sequence":"first","affiliation":[]},{"given":"Liliana F.B.","family":"Soares","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o V.","family":"Gomes","sequence":"additional","affiliation":[]},{"given":"M\u00e1rio M.","family":"Freire","sequence":"additional","affiliation":[]},{"given":"Pedro R.M.","family":"In\u00e1cio","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib1","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","article-title":"From information security to cyber security","volume":"38","author":"von Solms","year":"2013","journal-title":"Computers & Security"},{"issue":"5","key":"10.1016\/B978-0-12-411474-6.00025-6_bib2","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/MSP.2011.132","article-title":"Cyber Warfare","volume":"9","author":"Berson","year":"2011","journal-title":"IEEE Secur Privacy"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib3","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1361-3723(13)70006-X","article-title":"Security review: the past year","volume":"1","author":"Mansfield-Devine","year":"2013","journal-title":"Computer Fraud & Security"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib4","series-title":"An introduction to internet governance","author":"Kurbalija","year":"2012"},{"issue":"1","key":"10.1016\/B978-0-12-411474-6.00025-6_bib5","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/MSP.2013.8","article-title":"From the enterprise perimeter to a mobility-enabled secure cloud","volume":"11","author":"Amoroso","year":"2013","journal-title":"IEEE Secur Privacy"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib6","unstructured":"Websense. Threat Report. [Internet]. Available from: https:\/\/www.websense.com\/content\/websense-2013-threat-report.aspx; 2013."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib7","unstructured":"Cisco. 2013 Cisco Annual Security Report. [Internet]. Available from: http:\/\/www.cisco.com\/en\/US\/prod\/vpndevc\/annual_security_report.html; 2013."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib8","unstructured":"Kessem LS. New commercial Trojan. #INTH3WILD: Meet beta bot. RSA Blog. Available from: <https:\/\/blogs.rsa.com\/new-commercial-trojan-inth3wild-meet-beta-bot\/>; 2013 [accessed Jun. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib9","article-title":"Skimmer botnet targets credit card payment terminals","author":"Shah","year":"2013","journal-title":"McAfee Labs"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib10","article-title":"Group-IB exclusive details on Kangoo botnet that hit Australian banks","author":"Paganini","year":"2013","journal-title":"Security Affairs Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib11","article-title":"Homemade browser targeting Banco do Brasil Users","author":"Romera","year":"2013","journal-title":"TrendLabs Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib12","unstructured":"McAfee. Threats Predictions. [Internet]. Available from: <http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-threat-predictions-2013.pdf>; 2013."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib13","unstructured":"Reuters. Aramco says cyberattack was aimed at production. The New York Times. Available from: <http:\/\/www.nytimes.com\/2012\/12\/10\/business\/global\/saudi-aramco-says-hackers-took-aim-at-its-production.html?_r=0>; 2012 [accessed Jan. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib14","unstructured":"Yang K. Digital attack on Korean networks: WIPERS, time-bombs and Roman soldiers. Fortinet Blog. Available from: <http:\/\/blog.fortinet.com\/digital-attack-on-korean-networks-wipers-time-bombs-and-roman-soldiers\/>; 2013 [accessed Mar. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib15","article-title":"Backdoor wipes MBR, locks screen","author":"Bermejo","year":"2013","journal-title":"TrendLabs Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib16","article-title":"Recent spike in FBI ransomware striking worldwide","author":"Melick","year":"2013","journal-title":"Webroot Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib17","article-title":"Reveton ransomware adds password purloining function","author":"Donohue","year":"2013","journal-title":"Threatpost"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib18","unstructured":"Apvrille A. 1,000 malicious Android samples per day. Fortinet Blog. Available from: <http:\/\/blog.fortinet.com\/1-000-malicious-Android-samples-per-day\/>; 2013 [accessed May 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib19","unstructured":"F-Secure. Mobile threat report Q1 2013. [Internet]. Available from: <http:\/\/www.f-secure.com\/static\/doc\/labs_global\/Research\/Mobile_Threat_Report_Q1_2013.pdf>; 2013."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib20","unstructured":"Lookout. State of Mobile Security. [Internet]. Available from: <https:\/\/www.lookout.com\/resources\/reports\/state-of-mobile-security-2012>; 2012."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib21","article-title":"The most sophisticated android trojan","author":"Unuchek","year":"2013","journal-title":"Securelist Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib22","article-title":"Dorkbot malware infects facebook users: spies browser activities and grabs data","author":"Stanescu","year":"2013","journal-title":"Bitdefender Labs"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib23","unstructured":"Wanve U. Turkish \u2018delete virus\u2019 targets facebook users. McAfee Labs. Available from: <http:\/\/blogs.mcafee.com\/mcafee-labs\/turkish-delete-virus-targets-facebook-users>; 2013 [accessed Apr. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib24","article-title":"Twitter malware: spreading more than just ideas","author":"Tamir","year":"2013","journal-title":"Trusteer Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib25","article-title":"Operation hangover: more links to the oslo freedom forum incident","author":"Boutin","year":"2013","journal-title":"ESET Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib26","article-title":"Your malware shall not fool us with those anti analysis tricks","author":"Ortega","year":"2012","journal-title":"AlienVault Labs"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib27","article-title":"Trend micro predictions for 2013 and beyond: threats to business, the digital lifestyle, and the cloud","author":"Genes","year":"2012","journal-title":"TrendLabs Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib28","article-title":"Travnet botnet controls victims with remote admin tool","author":"Wanve","year":"2013","journal-title":"McAfee Labs"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib29","article-title":"Microsoft, financial services and others join forces to combat massive cybercrime ring","author":"Smith","year":"2013","journal-title":"Microsoft News Center"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib30","article-title":"ZeuS\/ZBOT malware shapes up in 2013","author":"Yaneza","year":"2013","journal-title":"TrendLabs Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib31","doi-asserted-by":"crossref","unstructured":"Rossow C, Andriesse D, Werner T, StoneGross B, Plohmann D, Dietrich C J, et al. SoK: P2PWNED-Modeling and evaluating the resilience of peer-to-peer botnets. In: Proc of the 34th IEEE Symp on Security and Privacy; 2013; San Francisco, CA, USA. IEEE Computer Society, p. 1\u201315.","DOI":"10.1109\/SP.2013.17"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib32","unstructured":"News on multibanker, features now a Jabber P2P functionality. Kleissner & Associates SRO. Blog; 2013."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib33","unstructured":"Internet Census 2012: Port scanning \/0 using insecure embedded devices. [Internet]. Available from: http:\/\/internetcensus2012.bitbucket.org\/paper.html; 2012."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib34","unstructured":"Valerie. Lawful botnet and Internet census: When law is not the case? [Internet]. Available from: <http:\/\/www.diplointernetgovernance.org\/profiles\/blogs\/lawful-botnet-and-internet-census-when-law-is-not-the-case>; 2012"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib35","article-title":"Wordpress botnet explodes over weekend","author":"Liska","year":"2013","journal-title":"Symantec Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib36","article-title":"An avalanche in skype","author":"Bestuzhev","year":"2013","journal-title":"Securelist Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib37","article-title":"Skypemageddon by bitcoining","author":"Bestuzhev","year":"2013","journal-title":"Securelist Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib38","article-title":"Delving deeply into a bitcoin botnet","author":"Shah","year":"2013","journal-title":"McAfee Labs"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib39","doi-asserted-by":"crossref","unstructured":"Prolexic. Prolexic quarterly global DDoS attack report Q1 2013. [Internet]. Available from: <https:\/\/www.prolexic.com\/knowledge-center-ddos-attack-report-2013-q1.html>; 2013.","DOI":"10.1016\/S1353-4858(13)70045-X"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib40","article-title":"The DDoS that almost broke the internet","author":"Prince","year":"2013","journal-title":"CloudFlare"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib41","unstructured":"Trend Micro. Spear-phishing email: Most favored APT attack bait. [Internet]. Available from: <http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp-spear-phishing-email-most-favored-apt-attack-bait.pdf>"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib42","unstructured":"Commtouch. Internet threat trend report: April 2013. [Internet]. Available from: <http:\/\/www.commtouch.com\/uploads\/2013\/04\/Commtouch-Internet-Threats-Trend-Report-2013-April.pdf>; 2012."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib43","article-title":"Massive canadian pharmacy spam campaign","author":"Schultz","year":"2013","journal-title":"Cisco Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib44","unstructured":"Williams C. Massive spam and malware campaign following the Boston tragedy. Cisco Blog. Available from: <http:\/\/blogs.cisco.com\/security\/massive-spam-and-malware-campaign-following-the-boston-tragedy\/>; 2013 [accessed Apr. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib45","unstructured":"Anti-Phishing Working Group. Global phishing survey: Trends and domains name use in 2H 2012. [Internet]. Available from: <http:\/\/docs.apwg.org\/reports\/APWG_GlobalPhishingSurvey_2H2012.pdf>; 2013."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib46","unstructured":"SMS phishing leads to an advance fee spam scam across Europe. Infosecurity Magazine. Available from: <http:\/\/www.infosecurity-magazine.com\/view\/32319\/sms-phishing-leads-to-an-advance-fee-spam-scam-across-europe\/>; 2013 [accessed May 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib47","article-title":"Facebook \u2018fan page verification program\u2019 phishing scam","author":"White","year":"2013","journal-title":"Hoax-Slayer Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib48","article-title":"Malware phishes with fake facebook security check page","author":"Melgarejo","year":"2013","journal-title":"TrendLabs Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib49","article-title":"Is digital marketing the new spam?","author":"Diaz","year":"2013","journal-title":"Securelist Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib50","article-title":"Increase in pump and dump stock spam","author":"Muralidharan","year":"2013","journal-title":"Symantec Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib51","article-title":"Rise in URL spam","author":"Patil","year":"2013","journal-title":"Symantec Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib52","unstructured":"Symantec. Internet security threat report 2013. [Internet]. Available from: <https:\/\/www.symantec.com\/security_response\/publications\/threatreport.jsp>; 2013."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib53","unstructured":"MITRE. CVE website. [Internet]. Available from: <https:\/\/cve.mitre.org\/>; 2013."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib54","unstructured":"Symantec Security Response. Internet Explorer zero-day used in watering hole attack: Q&A. Symantec Blog. Available from: <http:\/\/www.symantec.com\/connect\/blogs\/internet-explorer-zero-day-used-watering-hole-attack-qa>; 2012 [accessed Jan. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib55","article-title":"Microsoft, adobe push critical security updates","author":"Krebs","year":"2013","journal-title":"KrebsOnSecurity Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib56","unstructured":"Symantec. First quarter zero-day vulnerabilities. Symantec Blog. Available from: <http:\/\/www.symantec.com\/connect\/blogs\/2013-first-quarter-zero-day-vulnerabilities>; 2013 [accessed Apr. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib57","unstructured":"OWASP. The ten most critical Web application security risks. [Internet]. 2013. Available from:https:\/\/www.owasp.org\/index.php\/Top_10_; 2013."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib58","unstructured":"Oracle. Oracle Java SE critical patch update advisory. [Internet]. Apr. Available from: <http:\/\/www.oracle.com\/technetwork\/topics\/security\/javacpuapr2013-1928497.html>; 2013."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib59","unstructured":"RepoCERT. Botnet using Plesk vulnerability and takedown. Seclists Website. Available from: <http:\/\/seclists.org\/fulldisclosure\/2013\/Jun\/36>; 2013 [accessed Jun. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib60","unstructured":"Fisher D. Schneider patches 18-month-old SCADA bugs. Threatpost. Available from: <https:\/\/threatpost.com\/schneider-patches-18-month-old-scada-bugs>; 2013 [accessed Jun. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib61","article-title":"Service-wide Password Reset","author":"Engberg","year":"2013","journal-title":"Evernote Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib62","article-title":"Keeping our users secure","author":"Lord","year":"2013","journal-title":"Twitter Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib63","article-title":"Reset your drupal.org password","author":"Ross","year":"2013","journal-title":"Drupal Forum"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib64","article-title":"Hacker breached U.S. army database containing sensitive information on dams","author":"Zetter","year":"2013","journal-title":"Wired"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib65","article-title":"Hackers in china attacked the Times for last 4 months","author":"Perlroth","year":"2013","journal-title":"The New York Times"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib66","unstructured":"Mandiant. APT1: Exposing one of China\u2019s cyber espionage units. [Internet]\/ Apr. Available from: <http:\/\/intelreport.mandiant.com\/Mandiant_APT1_Report.pdf>; 2013."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib67","doi-asserted-by":"crossref","unstructured":"Honan M. How Apple and Amazon security flaws led to my epic hacking. Wired. Available from: <http:\/\/www.wired.com\/gadgetlab\/2012\/08\/apple-amazon-mat-honan-hacking\/>; 2012 [accessed Jan. 2013].","DOI":"10.7312\/star16075-030"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib68","unstructured":"Ponemon Institute. 2013 cost of data breach study: Global analysis. Symantec Website. Available from: <http:\/\/www.symantec.com\/about\/news\/resources\/press_kits\/detail.jsp?pkid=ponemon-2013>; 2013 [accessed May 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib69","unstructured":"Sun News. Hospital discloses privacy breach. Sun News. Available from: <http:\/\/news.sonomaportal.com\/2013\/05\/24\/hospital-discloses-privacy-breach\/>; 2013 [accessed May 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib70","unstructured":"Check Point. Check point 2013 security report. [Internet]. Available from: <https:\/\/www.checkpoint.com\/campaigns\/security-report\/>; 2013."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib71","article-title":"Edward Snowden comes forward as source of NSA leaks","author":"Barton Gellman","year":"2013","journal-title":"The Washington Post"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib72","unstructured":"Schneier B. Government secrets and the need for whistle-blowers. Schneier on Security Blog. Available from: <https:\/\/www.schneier.com\/blog\/archives\/2013\/06\/government_secr.html>; 2013 [accessed Jun. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib73","unstructured":"Verizon. 2012 data breach investigations report. [Internet]. Available from: <http:\/\/www.verizonenterprise.com\/DBIR\/2012\/>; 2012."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib74","unstructured":"Symantec. Symantec intelligence report. [Internet]. Available from : <http:\/\/www.symantec.com\/connect\/blogs\/symantec-intelligence-report-may-2013>; 2013."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib75","unstructured":"Taddeo M. An analysis for a just cyber warfare. In CYCON: 4th International Conference on Cyber Conflict; 2012; Tallinn, Estonia. p. 1\u201310."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib76","doi-asserted-by":"crossref","unstructured":"Watts S. The notion of combatancy in cyber warfare. In CYCON: 4th Int Conf on Cyber Conflict; 2012; Tallinn, Estonia. p. 1\u201315.","DOI":"10.2139\/ssrn.2484823"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib77","unstructured":"ICS-CERT. Monthly Monitor. [Internet]. Available from: <https:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/ICS-CERT_Monitor_Jan-Mar2013.pdf>; 2013."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib78","article-title":"Rise in URL spam","author":"Shauk","year":"2013","journal-title":"Symantec Blogs"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib79","unstructured":"McAfee. McAfee threats report-fourth quarter 2012. [Internet]. 2013. Availabe from: <http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-quarterly-threat-q4-2012.pdf.>"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib80","unstructured":"Coronado C. Blackhole exploit kit leverages Margaret Thatcher\u2019s death. Trend Micro. Available from: <http:\/\/about-threats.trendmicro.com\/us\/spam\/460\/Blackhole+Exploit+Kit+Leverages+Margaret+Thatchers+Death>; 2013 [accessed Apr. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib81","unstructured":"Trend Micro. Russian underground 101. [Internet]. 2012. Available from: <http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp-russian-underground-101.pdf.>"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib82","unstructured":"Musthaler L. DDoS-as-a-service? You betcha! It\u2019s cheap, it\u2019s easy, and it\u2019s available to anyone. Security Bistro. Available from: <http:\/\/www.securitybistro.com\/?p=4121>; 2012 [accessed Jan. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib83","unstructured":"Trustwave. 2013 global security report. [Internet]. Available from: <https:\/\/www2.trustwave.com\/2013GSR.html>; 2013."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib84","unstructured":"Schwartz M.J. Zeus bank malware surges on Facebook. InformationWeek. Available from: <http:\/\/www.informationweek.com\/security\/attacks\/zeus-bank-malware-surges-on-facebook\/240156156>; 2013 [accessed Jun. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib85","unstructured":"Eleven arrests as global investigation dismantles criminal web forum. SOCA Website. Available from: <http:\/\/www.soca.gov.uk\/news\/552-eleven-arrests-as-global-investigation-dismantles-criminal-web-forum>; 2013 [accessed Jun. 2013]."},{"issue":"5","key":"10.1016\/B978-0-12-411474-6.00025-6_bib86","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1145\/42411.42412","article-title":"Stalking the wily hacker","volume":"31","author":"Stoll","year":"1988","journal-title":"Commun ACM"},{"issue":"8","key":"10.1016\/B978-0-12-411474-6.00025-6_bib87","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1145\/358198.358210","article-title":"Reflections on trusting trust","volume":"27","author":"Thompson","year":"1984","journal-title":"Commun ACM"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib88","series-title":"The cuckoo\u2019s egg: Tracking a spy through the maze of computer espionage","author":"Stoll","year":"1989"},{"issue":"1","key":"10.1016\/B978-0-12-411474-6.00025-6_bib89","first-page":"54","article-title":"Targeted cyberattacks: A superset of advanced persistent threats","volume":"11","author":"Sood","year":"2013","journal-title":"IEEE Secur Privacy"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib90","unstructured":"GReAT. \"Red October\" diplomatic cyber attacks investigation. Securelist Blog. Available from: <http:\/\/www.securelist.com\/en\/analysis\/204792262\/Red_October_Diplomatic_Cyber_Attacks_Investigation>; 2013 [accessed Jan. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib91","unstructured":"Kaspersky Lab. The NetTraveler. [Internet]. 2013. Available from: <http:\/\/www.securelist.com\/en\/downloads\/vlpdfs\/kaspersky-the-net-traveler-part1-final.pdf.>"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib92","unstructured":"Norman. Operation hangover: Norman unveiling an Indian cyberattack infrastructure. [Internet]. 2013. Available from: <http:\/\/enterprise.norman.com\/resources\/files\/Unveiling_an_Indian_Cyberattack_Infrastructure.pdf.>"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib93","unstructured":"Fagerland S. The hangover report. Norman Blog. Available from: <http:\/\/blogs.norman.com\/2013\/security-research\/the-hangover-report>; 2013 [accessed May 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib94","unstructured":"Kovacs E. 20 Chinese government sites defaced by anonymous Algeria hacker Charaf Anons. Softpedia. Available from: <http:\/\/news.softpedia.com\/news\/28-Chinese-Government-Sites-Defaced-by-Anonymous-Algeria-Hacker-Charaf-Anons-339986.shtml>; 2013 [accessed Mar. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib95","series-title":"Anonymous-linked groups hack Israeli websites, release personal data","author":"Kredo","year":"2013"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib96","article-title":"Why #OpIsrael was an #OpFail","author":"Lake","year":"2013","journal-title":"The Daily Beast"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib97","article-title":"The effects of #OpUSA","author":"Schultz","year":"2013","journal-title":"Cisco Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib98","article-title":"Understanding the impact of Web attacks-The user perspective","author":"Rudger","year":"2013","journal-title":"Keynote Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib99","unstructured":"Bigs. Anonymous leaked massive pedophile d0x in response to child s*x rings. Cyberwarzone. Available from: <http:\/\/cyberwarzone.com\/anonymous-leaked-massive-pedophile-d0x-response-child-sx-rings>; 2013 [accessed Mar. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib100","article-title":"Guantanamo Bay shuts off wi-fi after Anonymous threatens #OpGTMO attack on prison camp","author":"Heller","year":"2013","journal-title":"International Business Times"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib101","article-title":"Twitter hack causes panic on Wall Street and sends Dow plunging","author":"Moore","year":"2013","journal-title":"The Guardian"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib102","article-title":"Legal experts: Stuxnet attack on Iran was illegal \u2018act of force\u2019","author":"Zetter","year":"2013","journal-title":"Wired"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib103","article-title":"Cyber war, this is not","author":"Gossels","year":"2013","journal-title":"SCMagazine"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib104","unstructured":"Kaspersky Lab. Gauss: Nation-state cyber-surveillance meets banking Trojan. SecureList Blog. Available from: <http:\/\/www.securelist.com\/en\/blog\/208193767\/Gauss_Nation_state_cyber_surveillance_meets_banking_Trojan>; 2012 [accessed Jan. 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib105","article-title":"BANKER malware hosted in compromised Brazilian government sites","author":"Santos","year":"2013","journal-title":"TrendLabs Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib106","unstructured":"To D. Compromised US government webpage used zero-day exploit. TrendLabs Blog. Available from: <http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/compromised-us-government-webpage-used-zero-day-exploit\/>; 2013 [accessed May 2013]."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib107","unstructured":"General Electric. GE information security technology center. [Internet]. 2013. Available from: http:\/\/www.ge.com\/careers\/ge-information-security-technology-center."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib108","article-title":"Australia\u2019s new cyber security center will be \u2019fully operational by late 2013.","author":"Benitez","year":"2013","journal-title":"NATOSource News Blog"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib109","article-title":"Pentagon creating \u201crules of engagement\u201d for responding to advanced attackers","author":"Brito","year":"2013","journal-title":"Mandiant M-Unition"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib110","unstructured":"Commission on the theft of American intellectual property. The Report of the Commission on the Theft of American Intellectual Property. [Internet]. Available from: <http:\/\/ipcommission.org\/report\/IP_Commission_Report_052213.pdf>; 2013."},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib111","article-title":"2 minutes on: The rule of war","author":"Colon","year":"2013","journal-title":"SCMagazine"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib112","article-title":"US government to propose bill targeting foreign hackers","author":"Kerr","year":"2013","journal-title":"CNET"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib113","article-title":"Spanish police might use Trojans to spy computers","author":"Rial","year":"2013","journal-title":"New Europe"},{"key":"10.1016\/B978-0-12-411474-6.00025-6_bib114","unstructured":"Marquis-Boire M, Marczak B, Guarnieri C, Scott-Railton J. The Commercialization of Digital Spying. [Internet]. Available from: <https:\/\/citizenlab.org\/storage\/finfisher\/final\/fortheireyesonly.pdf>; 2013."}],"container-title":["Emerging Trends in ICT Security"],"original-title":[],"language":"en","deposited":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T10:00:38Z","timestamp":1564653638000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780124114746000256"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9780124114746"],"references-count":114,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-411474-6.00025-6","relation":{},"subject":[],"published":{"date-parts":[[2014]]}}}