Query Result Set
SLIM21 Home
Advanced Search
My Info
Browse
Arrivals
Expected
Reference Items
Journal List
Proposals
Media List
Rules
ActiveUsers:2714
Hits:21028178
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
Help
Topics
Tutorial
Advanced search
Hide Options
Sort Order
Natural
Author / Creator, Title
Title
Item Type, Author / Creator, Title
Item Type, Title
Subject, Item Type, Author / Creator, Title
Item Type, Subject, Author / Creator, Title
Publication Date, Title
Items / Page
5
10
15
20
Modern View
HACKERS
(6)
answer(s).
Srl
Item
1
ID:
114711
Cyberweapons: leveling the international playing field
/ Rustici, Ross M
Rustici, Ross M
Journal Article
0 Rating(s) & 0 Review(s)
Publication
2012.
Key Words
NATO
;
United States
;
Cyberwarfare
;
Hackers
;
Cyberweapons
;
Cyberthreats
;
Soviet Union
Links
'Full Text'
In Basket
Export
2
ID:
089333
Fatal flaw: the media and the Russian invasion of Georgia
/ Akhvlediani, Margarita
Akhvlediani, Margarita
Journal Article
0 Rating(s) & 0 Review(s)
Publication
2009.
Summary/Abstract
This paper examines the role of the media during and after the August invasion of Georgia by Russian troops. It shows how on both sides the media responded to strong pressures to report the conflict from a very one-sided perspective. Indeed the conflict can be seen as a media as much as a military conflict as both sides struggled to present themselves in the best possible light before the international community and to exaggerate the losses that had been inflicted on their own rather then their enemy's forces. The article details the way this conflict was played out in printed media and TV as well as Internet blogs and provides information on the cyber war, which also broke out between the rival states.
Key Words
Media
;
Truth
;
Russia
;
Georgia
;
Journalists
;
Public relations
;
Cyber War
;
Nationality
;
Reportage
;
Conflict Zones
;
Blogs
;
Hackers
Links
'Full Text'
In Basket
Export
3
ID:
150407
Fear this man: David Vincenzetti built a spyware empire. Is the Italian mogul a code breaker or an arms dealer?
/ Kushner, David
Kushner, David
Journal Article
0 Rating(s) & 0 Review(s)
Key Words
Human Rights
;
Hacking
;
Political Reform
;
Hackers
;
Security Industry
;
Google
;
Spyware
;
Security Researcher
In Basket
Export
4
ID:
112056
Fighting the quiet WMD-cyber warfare
/ Oppenheimer, Andy
Oppenheimer, Andy
Journal Article
0 Rating(s) & 0 Review(s)
Publication
2012.
Key Words
WMD
;
Cyber Security
;
Cyber crime
;
Cyber Warfare
;
Nuclear power plant
;
Hackers
;
Cyber Terrorist
;
Air Traffic
;
Cyber Experts
;
UK's New Strategy
;
Cyber Soldier
;
Battlefield System
In Basket
Export
5
ID:
114631
Social network of hackers
/ Decary-Hetu, David; Dupont, Benoit
Dupont, Benoit
Journal Article
0 Rating(s) & 0 Review(s)
Publication
2012.
Summary/Abstract
Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical capabilities of researchers working in the field of cybercrimes. Rather than focusing on the technical tools that could enhance research performance, this article focuses on a specific field that has demonstrated its use in the study of criminal networks: social network analysis (SNA). This article evaluates the effectiveness of SNA to enhance the value of information on cybercriminals. This includes both the identification of possible targets for follow-up research as well as the removal of subjects who may be wasting the researchers' time. This article shows that SNA can be useful on two levels. First, SNA provides scientific and objective measures of the structure of networks as well as the position of their key players. Second, fragmentation metrics, which measure the impact of the removal of n nodes in a network, help to determine the amount of resources needed to deal with specific organisations. In this case study, a tactical strike against the network could have had the same destabilising impact as a broader approach. The resources saved by limiting the investigation targets could then be used to monitor the criminal network's reaction to the arrests and to limit its ability to adapt to the post-arrest environment.
Key Words
Organised Crime
;
Social Network Analysis
;
Hackers
;
Botnet
Links
'Full Text'
In Basket
Export
6
ID:
154625
War in cyberspace
/ Shahid, K K
Shahid, K K
Journal Article
0 Rating(s) & 0 Review(s)
Key Words
India
;
Pakistan
;
Cyberspace
;
Cyber War
;
Hackers
In Basket
Export