27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Merritt Baer<br />

Report of the Defense Science Board (2010), “Capability Surprise,” [online],<br />

http://www.acq.osd.mil/dsb/reports/ADA506396.pdf<br />

Rescorla, E. (2004) “Is Finding Security Holes a Good Idea?” Third Workshop on the Economics of Information<br />

Security, Minneapolis, MN.<br />

Reuters (2010) “Wikileaks Battle: A New Amateur Face of Cyber War?” CNBC<br />

Rhode, Klaus (2005) Nonequilibrium Ecology. Cambridge University Press, Cambridge, MA.<br />

-- [online] “Games Theory (Nash Equilibria) in International Conflicts,” http://knol.google.com/k/games-theorynash-equilibria-in-international-conflicts#<br />

Saydjari, O.S. (2004) “Cyber Defense: Art to Science,” Communications of the ACM Vol. 47, No. 3 pp. 52-57.<br />

Schavland, J., Chan, Y., and Raines, R.A. (2009), “Information Security: Designing a Stochastic-Network for<br />

Throughput and Reliability.” Naval Research Logistics Vol. 56, No. 7, pp. 625-641.<br />

Shapcott, Brad “Economics Proverbs,” [online], CEO Magazine<br />

http://ceomagazine.biz/hrmproverbs/economicsproverbs.htm<br />

Shen, D., Chen, G., Haynes, L.S., Cruz, J.B., Kruger, M. and Blasch, E. (2007) “A Markov Game Approach to<br />

Cyber Security,” [online], SPIE Newsroom, "https://spie.org/x15400.xml?ArticleID=x15400"<br />

https://spie.org/x15400.xml?ArticleID=x15400<br />

Shofield, J. (2008) “It‟s Every Man for Himself,” The Guardian.<br />

Sills, M. (2009) “ULL gets Air Force contract: Researchers to develop preemptive cyber security strategies,” The<br />

Advocate [online] http://www.2theadvocate.com/news/79589152.html?c=1287843989513<br />

Soares, M. (2009) “Brazilian Blackout Traced to Sooty Insulators, Not Hackers,” Wired Magazine.<br />

Spring, B. “Nuclear Games: A Tool for Examining Nuclear Stability in a Proliferated Setting,” [online],<br />

http://www.heritage.org/Research/nationalSecurity/upload/hl_1066.pdf<br />

Umehara, E. and Ohta, T. (2009) “Using Game Theory to Investigate Risk Information Disclosure by Government<br />

Agencies and Satisfying the Public—the Role of the Guardian Agent," Systems, Man and Cybernetics, Part<br />

A: IEEE Transactions on Systems and Humans Vol. 39, No. 2, pp. 321-330.<br />

Verizon 2009 Data Breach Investigations Report, [online], Verizon Business Security Solutions,<br />

http://securityblog.verizonbusiness.com/2009/04/15/2009-dbir/<br />

Verizon 2010 Data Breach Investigations Report, [online], Verizon Business Security Solutions,<br />

http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf<br />

Wilson, C. (2008) “Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress”<br />

Congressional Research Service Order Code RL32114, Washington, DC.<br />

Woodward, P. (2010) “Stuxnet: the Trinity Test of Cyberwarfare,” War in Context [online]<br />

http://warincontext.org/2010/09/23/stuxnet-the-trinity-test-of-cyberwarfare/<br />

Zittrain, J., Lord, Lt. Gen. W., Geer, D., (2010) Cybercrime and Cyberwarfare class, Harvard Law School.<br />

Zittrain, J. (2008) The Future of the Internet—and How to Stop It. Yale University Press, New Haven, CT.<br />

-- (2009) “The Web as Random Acts of Kindness” [online video]<br />

http://www.ted.com/talks/jonathan_zittrain_the_web_is_a_random_act_of_kindness.html<br />

31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!