Bibliography
The following abbreviations are used in this bibliography.
[ADE08] Adee, S. “The Hunt for the Kill Switch.” IEEE Spectrum, May 2008.
[AGR00] Agrawal, R., and Srikant, R. “Privacy-Preserving Data Mining.” Proc ACM SIGMOD Conf on Management of Data, May 2000.
[AIR08] AirDefense, Inc. “Bluetooth Networks: Risks and Defenses.” Unpublished white paper, 2008. http://www.airdefense.net/whitepapers/
[ALB09] Albrecht, M., et al. “Plaintext Recovery Attacks Against SSH.” Proc 2009 IEEE Symp Security and Privacy, 2009, p16–26.
[ALB11] Albright, D., et al. “Stuxnet Malware and Natanz: Update of ISIS December 22, 2010 Report.” Institute for Science ...
Get Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.