12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ReferencesCONCLUSION AND THE FUTURE OF CYBER WARFARE1. Shor PW. Polynomial-time algorithms for prime fac<strong>to</strong>rization and discrete logarithms on a quantum computer.Proceedings of the 35th annual symposium on foundations of computer science, Santa Fe, NM, November 20–22,1994.2. IBM Research Advances Device Performance for Quantum Computing. IBM. http://www-03.ibm.com/press/us/en/pressrelease/36901.wss; February 28, 2012.3. Physicists Make Breakthrough in Quantum Computing. UC Newsroom. http://www.universityofcalifornia.edu/news/article/26209; September 1, 2011.4. Gershon E. At Yale, quantum computing is a (qu)bit closer <strong>to</strong> reality. Yale News. http://news.yale.edu/2012/02/14/yale-quantum-computing-qubit-closer-reality; February 14, 2012.5. Researchers Make Quantum Processor Capable of Fac<strong>to</strong>ring a Composite Number in<strong>to</strong> Prime Fac<strong>to</strong>rs. ScienceDaily. http://www.sciencedaily.com/releases/2012/08/120819153743.htm; August 19, 2012.6. Greenberg A. Meet the Hackers Who Sell Spies the Tools <strong>to</strong> Crack Your PC (and Get Paid Six-Figure Fees). Forbes.http://www.forbes.com/sites/andygreenberg/2012/03/21/meet-the-hackers-who-sell-spies-the-<strong>to</strong>ols-<strong>to</strong>crack-your-pc-and-get-paid-six-figure-fees/;April 9, 2012.Greenberg A. Shopping for Zero-Days: A Price List for Hackers’ Secret Software Exploits. Forbes. http://www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/; March 23, 2012.7. The Digital Arms Trade. The Economist. http://www.economist.com/news/business/21574478-marketsoftware-helps-hackers-penetrate-computer-systems-digital-arms-trade;March 30, 2013 [accessed April 23,2013].8. Traynor P, et al. On cellular botnets: measuring the impact of malicious devices on a cellular network core. ACMconference on computer and communication security, November 2009; 2009.9. Zink T. Spam from an Android botnet. Terry Zink’s <strong>Cyber</strong> Security Blog. http://blogs.msdn.com/b/tzink/archive/2012/07/03/spam-from-an-android-botnet.aspx; July 3, 2012.10. For further discussion on Iranian influence in the Middle East and the Shi’ite crescent, we recommend Vali Nasr’sThe Shia Revival: How Conflicts Within Islam Will Shape the Future. W.W. Nor<strong>to</strong>n; 2006.243

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!