Number of purchasers: 0, views: 468
Readers community rating: votes 0
1. Harris S. @War: The Rise of the Military-Internet Complex. Boston, Houghton Mifflin Harcourt, Eamon Dolan, 1st ed., 2014. 288 p.
2. Steffens T. Attribution of Advanced Persistent Threats. How to Identify the Actors Behind Cyber-Espionage. Berlin, Springer, 2020. 205 p. DOI: 10.1007/978-3-662-61313-9
3. Grotto A. Deconstructing Cyber Attribution: A Proposed Framework and Lexicon. IEEE Security & Privacy, 2020, vol. 18, no. 1, pp. 12-20. DOI: 10.1109/MSEC.2019.2938134
4. Goel S., Nussbaum B. Attribution Across Cyber Attack Types: Network Intrusions and Information Operations. IEEE Open Journal of the Communications Society, 2021, no. 2, pp. 1082-1093. DOI: 10.1109/OJCOMS.2021.3074591
5. Wheeler D.A., Larsen G.N. Techniques for Cyber Attack Attribution. Institute for Defense Analyses. October 2003. 84 p.
6. Lukatskyi A.V. Determining the Source of Cyber-Attacks. Security Index, 2015, vol. 21, no. 2 (113), pp. 73-86. (In Russ.)
7. Romashkina N.P., Markov A.S., Stefanovich D.V. International Security, Strategic Stability and Information Technologies. Moscow, IMEMO, 2020. 98 p. (In Russ.) DOI: 10.20542/978-5-9535-0581-9
8. Romashkina N.P. Global Military Political Problems in International Informational Security: Trends, Threats and Prospects. Cybersecurity Issues, 2019, no. 1 (29), pp. 2-9. (In Russ.) DOI: 10.21681/2311-3456-2019-1-2-9
9. Krutskikh A.V., Streltsov A.A., Tikk E. International Information Security: Problems and Ways of Solving them. Routledge Handbook of International Cybersecurity. Tikk E., Kerttunen M., eds. London, Taylor and Francis, 2020, pp. 260-268. DOI: 10.4324/9781351038904-26
10. Zinovieva E.S. Cyber-Deterrence and Digital Security Dilemma in American Expert Discourse. International Trends, 2019, no. 3 (58), pp. 51-65. (In Russ.) DOI: 10.17994/IT.2019.17.3.58.4
11. Sebekin S. Constant Involvement in Cyberspace: New US Strategy and its Correlation with the Concept of Cyber Support. International Trends, 2020, vol. 18, no. 3 (62), pp. 96-125. (In Russ.) DOI: 10.17994/IT.2020.18.3.62.3
12. Shakleina T.A., Baykov A.A., eds. Megatrends. The Main Trajectories of the Evolution of the World Order in the XXI Century. Moscow, Aspect Press, 2022. 520 p. (In Russ.)
13. Streltsov A.A. Sovereignty and Jurisdiction in the Environment of Information and Communication Technologies in the Context of International Security. The International Affairs, 2017, no. 2, pp. 87-106. (In Russ.) Available at: https://interaffairs.ru/jauthor/material/1806 (accessed 23.09.2022).
14. Healey J. Beyond Attribution: Seeking National Responsibility for Cyber Attacks. Atlantic Council. IssueBrief, 2012, no. 2, pp. 1-8. Available at: https://www.files.ethz.ch/isn/142271/022212_ACUS_NatlResponsibilityCyber.pdf (accessed 23.09.2022).
15. Cal N.M. Crossing the Rubicon: Identifying and Responding to an Armed Cyber-Attack. International Conference on Cyber Conflict (CyCon U.S.), 2016, pp. 1-7. DOI: 10.1109/CYCONUS.2016.7836612
16. Biller J., Schmitt M. Classification of Cyber Capabilities and Operations as Weapons, Means, or Methods of Warfare. International Law Studies, 2019, vol. 95, pp. 179-225.
17. Smirnov A.I. The Problem of Attribution of Cyberattacks in the Context of International Information Security. International Information Security: A New Geopolitical Reality. Zinovieva E.S., Alborova M.B., eds. Moscow, Aspect Press, 2021, pp. 61-66. (In Russ.)
18. Markov A.S., Sheremet I.A. Enhancement of Confidence in Software in the Context of International Security. CEUR Workshop Proceedings, 2019, vol. 2603, pp. 88-92. Available at: http://ceur-ws.org/Vol-2603/paper19.pdf (accessed 23.09.2022).
19. Skopik F., Pahi T. Under False Flag: Using Technical Artifacts for Cyber-Attack Attribution. Cybersecurity, 2020, vol. 3, no. 8, pp. 1-20. DOI: 10.1186/s42400-020-00048-4
20. Dacier M., Pham V.-H., Thonnard O. The WOMBAT Attack Attribution Method: Some Results. Proceedings of the fifth International Conference Information Systems Security. ICISS, 14–18.12.2009, pp. 19-37. DOI: 10.1007/978-3-642-10772-6_3
21. Nguyen V. Attribution of Spear Phishing Attacks: A Literature Survey. Edinburgh (Australia), DSTO, 2013. 167 p.
22. Derian-Toth G., Walsh R., Sergueeva A., et all. Opportunities for Public and Private Attribution of Cyber Operations. Tallinn Paper, 2021, no. 12. 80 p. Available at: https://complexdiscovery.com/wp-content/uploads/2021/08/Tallinn-Papers-Attribution-18082021.pdf (accessed 23.09.2022).
23. Minto B. The Pyramid Principle: Logic in Writing and Thinking. London, Minto International, PLR, 2021. 240 p.
24. Rid T., Buchanan B. Attributing Cyber Attacks. The Journal of Strategic Studies, 2015, vol. 38, no. 1–2, pp. 4-37. DOI: 10.1080/01402390.2014.977382
25. Caltagirone S., Pendergast A., Betz C. The Diamond Model of Intrusion Analysis. London, Defense Technical Information Center, 2013. 80 p.
26. Brandao P.R. Advanced Persistent Threats (APT)-Attribution-MICTIC Framework Extension. Journal of Computer Science, 2021, no. 17 (5), pp. 470-479. DOI: 10.3844/jcssp.2021.470.479
27. Markov A.S. Problems of Attribution and Regulation of International Information Security. 14th International Forum "Partnership of the State, Business and Civil Society in Ensuring International Information Security". Moscow, NAMIB, 2020, pp. 88-93. (In Russ.)
28. Krutskikh A.V., Biryukov A.V., Boyko S.M., et al. International Information Security: Theory and Practice. Krutskikh A.V., ed. Moscow, MGIMO, 2021. Vol. 1. 384 p. (In Russ.)