Bibliography

The following abbreviations are used in this bibliography.

image

[ADE08] Adee, S. “The Hunt for the Kill Switch.” IEEE Spectrum, May 2008.

[AGR00] Agrawal, R., and Srikant, R. “Privacy-Preserving Data Mining.” Proc ACM SIGMOD Conf on Management of Data, May 2000.

[AIR08] AirDefense, Inc. “Bluetooth Networks: Risks and Defenses.” Unpublished white paper, 2008. http://www.airdefense.net/whitepapers/

[ALB09] Albrecht, M., et al. “Plaintext Recovery Attacks Against SSH.” Proc 2009 IEEE Symp Security and Privacy, 2009, p16–26.

[ALB11] Albright, D., et al. “Stuxnet Malware and Natanz: Update of ISIS December 22, 2010 Report.” Institute for Science ...

Get Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.