11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Bibliography[272] G. McDonald, L. O. Murchu, S. Doherty, and E. Chien. Stuxnet 0.5: The Missing Link,Feb. 2013. http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/stuxnet_0_5_the_missing_link.pdf.[273] M. McGlohon, S. Bay, M. G. Anderle, D. M. Steier, and C. Faloutsos. SNARE: A LinkAnalytic System for Graph Labeling and Risk Detection. In Proceedings of the 15th ACMSIGKDD international conference on Knowledge discovery and data mining - KDD ’09, page 1265.ACM Press, 2009.[274] S. McLaughlin and P. McDaniel. SABOT: specification-based payload generation forprogrammable logic controllers. In ACM conference on Computer and CommunicationsSecurity. ACM Request Permissions, Oct. 2012.[275] R. McMillan. Stolen Twitter accounts can fetch $1000. 2010. http://www.computerworld.com/s/article/9150001/Stolen_Twitter_accounts_can_fetch_1_000.[276] K. McNamee. Malware Analysis Report: ZeroAccess/Sirefef, 2012. Technical Report byKindsight Security Labs.[277] M. Miculan and C. Urban. Formal analysis of face<strong>book</strong> connect single sign-on authenticationprotocol. In SOFSEM, volume 11, pages 22–28, 2011.[278] B. Miller and D. Rowe. A survey of SCADA and critical infrastructure incidents. In Annualconference on Research In Information Technology. ACM Request Permissions, Oct. 2012.[279] M. Miller, T. Burrell, and M. Howard. Mitigating software vulnerabilities, July 2011.http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=26788.[280] Z. Minchev and V. Shalamanov. Scenario Generation and Assessment Framework Solutionin Support of the Comprehensive Approach. In RTO-MP-SAS-081, Symposium on "AnalyticalSupport to Defence Transformation", Boyana, Bulgaria, April 26-28, pages 22–1–22–16, 2010.[281] D. Misener. Rise of the socialbots: They could be influencing you online.2011. http://www.cbc.ca/news/technology/story/2011/03/29/f-vp-misenersocialbot-armies-election.html.[282] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurementand analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM conferenceon Internet measurement - IMC ’07, page 29. ACM Press, 2007.[283] A. Mislove, A. Post, and P. Druschel. Ostra: Leveraging trust to thwart unwanted communication.In Proceedings of the 5th USENIX Symposium on Networked Systems Design andImplementation, number i, pages 15–30, 2008.[284] Mitre. Common Vulnerabilities and Exposures (CVE). http://cve.mitre.org/, 2011.[285] A. Mohaisen, A. Yun, and Y. Kim. Measuring the mixing time of social graphs. InProceedings of the 10th annual conference on Internet measurement - IMC ’10, page 383. ACMPress, 2010.[286] M. Moore. Houses of Parliament computers infected with Conficker virus,2009. http://www.telegraph.co.uk/technology/microsoft/5057605/Houses-of-Parliament-computers-infected-with-Conficker-virus.html.[287] F. Moradi, T. Olovsson, and P. Tsigas. An Evaluation of Community Detection Algorithmson Large-Scale Email Traffic. In 11th International Symposium on Experimental Algorithms.Springer-Verlag, 2012.[288] F. Moradi, T. Olovsson, and P. Tsigas. Towards modeling legitimate and unsolicited emailtraffic using social network properties. In Proceedings of the Fifth Workshop on Social NetworkSystems - SNS ’12, 2012.[289] E. Morozov. Swine flu: Twitter’s power to misinform. 2009. http://neteffect.foreignpolicy.com/posts/2009/04/25/swine_flu_twitters_power_to_misinform.[290] T. Morris, A. Srivastava, B. Reaves, and W. Gao. A control system testbed to validate criticalinfrastructure protection concepts. . . . Infrastructure Protection . . . , 2011.178

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!