Bibliography
Aho, Alfred V., and Margaret J. Corasick. 1975. “Efficient string matching: An aid to bibliographic search.” Commun. ACM, 18(6) (June 1975): pp. 333–340.
Albright, David, Paul Brannan, and Christina Walrond. 2010. .ISIS Reports: “Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? Preliminary Assessment.” In http://isis-online.org/isis-reports/detail/did-stuxnet-take-out-1000-centrifuges-at-the-natanz-enrichment-plant/.
Arzt, S., S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau, and P. McDaniel. 2014. “FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps.” SIGPLAN Not. 49(6): pp. 259–269.
Bierma, M., E. Gustafson, J. Erickson, D. Fritz, and Y. R. Choe. 2014. “Andlantis: Large-scale Android Dynamic Analysis.” In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014. San Jose, CA, USA.
Blasco, Jaime. 2014. “Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks.” In https://www.alienvault.com/open-threat-exchange/blog/scanbox-a-reconnaissance-framework-used-on-watering-hole-attacks.
Blue Coat Systems. 2014. “One-day Wonders: How Malware Hides Among the Internet's Short-Lived Websites.” In https://www.bluecoat.com/security-report-one-day-wonders.
Bos, Herbert. “Shelia: A client-side honeypot for attack detection.” In www.cs.vu.nl/~herbertb/misc/shelia/.
Boutin, Jean-Ian. 2013. “Targeted information stealing attacks in South Asia ...
Get Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.