27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Rain Ottis<br />

Ottis, R. (2008) “Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective.”<br />

In Proceedings of the 7th <strong>European</strong> <strong>Conference</strong> on Information Warfare and Security. Reading: <strong>Academic</strong><br />

Publishing Limited, pp 163-168.<br />

Ottis, R. (2009) ”Theoretical Model for Creating a Nation-State Level Offensive Cyber Capability.” In Proceedings<br />

of the 8th <strong>European</strong> <strong>Conference</strong> on Information Warfare and Security. Reading: <strong>Academic</strong> Publishing<br />

Limited, pp 177-182.<br />

Ottis, R. (2010a) “From Pitch Forks to Laptops: Volunteers in Cyber Conflicts.” In Czosseck, C. and Podins, K.<br />

(Eds.) <strong>Conference</strong> on Cyber Conflict. Proceedings 2010. Tallinn: CCD COE Publications, pp 97-109.<br />

Ottis, R. (2010b) “Proactive Defence Tactics Against On-Line Cyber Militia.” In Proceedings of the 9th <strong>European</strong><br />

<strong>Conference</strong> on Information Warfare and Security. Reading: <strong>Academic</strong> Publishing Limited, pp 233-237.<br />

Williams, G., Arreymbi, J. (2007) Is Cyber Tribalism Winning Online Information Warfare? In Proceedings of<br />

ISSE/SECURE 2007 Securing Electronic Business Processes. Wiesbaden: Vieweg. On-line:<br />

http://www.springerlink.com/content/t2824n02g54552m5/n<br />

Young, S., Aitel, D. (2004) The Hacker’s Handbook. The Strategy behind Breaking into and Defending Networks.<br />

Boca Raton: Auerbach.<br />

313

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!