sources.bib 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125
  1. @inproceedings{fraunholz2017investigation,
  2. title={Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot},
  3. author={Fraunholz, Daniel and Krohmer, Daniel and Anton, Simon Duque and Schotten, Hans Dieter},
  4. booktitle={2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security)},
  5. pages={1--7},
  6. year={2017},
  7. organization={IEEE}
  8. }
  9. @online{virustotal2019a,
  10. title={VirusTotal},
  11. author={VirusTotal},
  12. year={2019},
  13. url={https://www.virustotal.com/gui/url/480b4fb7d537f76fd51b694a0f42239bbb64509d8464634cb4c639d93e5a36d6/detection}
  14. }
  15. @online{virustotal2019b,
  16. title={VirusTotal},
  17. author={VirusTotal},
  18. year={2019},
  19. url={https://www.virustotal.com/gui/url/81247b789c2bb718cc7c43b651de2016bd130d33556c79ec44036b3667541a1c/detection}
  20. }
  21. @online{virustotal2019c,
  22. title={VirusTotal},
  23. author={VirusTotal},
  24. year={2019},
  25. url={https://www.virustotal.com/gui/url/3d854adc5481527edb29bde25da0c99f5381200605c51d06271fe86d66f123df/detection}
  26. }
  27. @online{threatfeeds2019,
  28. title={Free threat intelligence feeds - Threatfeeds.io},
  29. author={Threatfeeds},
  30. year={2019},
  31. url={https://threatfeeds.io/}
  32. }
  33. @article{hammes2014comparison,
  34. title={Comparison of NoSQL and SQL Databases in the Cloud},
  35. author={Hammes, Dayne and Medero, Hiram and Mitchell, Harrison},
  36. journal={Proceedings of the Southern Association for Information Systems (SAIS), Macon, GA},
  37. pages={21--22},
  38. year={2014}
  39. }
  40. @online{geolite2,
  41. title={GeoLite2 Free Downloadable Databases},
  42. author={MaxMind},
  43. year={2019},
  44. url={https://dev.maxmind.com/geoip/geoip2/geolite2/}
  45. }
  46. @online{cowrieanalyzer,
  47. title={},
  48. author={Raidan Campbell},
  49. year={2017},
  50. url={https://github.com/raidancampbell/Cowrie-Analyzer}
  51. }
  52. @online{ferrara2015,
  53. title={Security Issue: Combining Bcrypt With Other Hash Functions},
  54. author={Anthony Ferrara},
  55. year={2015},
  56. url={https://blog.ircmaxell.com/2015/03/security-issue-combining-bcrypt-with.html?m=1}
  57. }
  58. @article{hendriks2017fixing,
  59. title={Fixing the average internet user’s IoT Vulnerabilities},
  60. author={Hendriks, Calvin},
  61. year={2017}
  62. }
  63. @article{van2017techniques,
  64. title={Techniques for detecting compromised IoT devices},
  65. author={Van der Elzen, Ivo and van Heugten, Jeroen},
  66. journal={University of Amsterdam},
  67. year={2017}
  68. }
  69. @inproceedings{antonakakis2017understanding,
  70. title={Understanding the mirai botnet},
  71. author={Antonakakis, Manos and April, Tim and Bailey, Michael and Bernhard, Matt and Bursztein, Elie and Cochran, Jaime and Durumeric, Zakir and Halderman, J Alex and Invernizzi, Luca and Kallitsis, Michalis and others},
  72. booktitle={26th USENIX Security Symposium (USENIX Security 17)},
  73. pages={1093--1110},
  74. year={2017}
  75. }
  76. @article{howard200519,
  77. title={19 Deadly Sins of Software Security},
  78. author={Howard, Michael and LeBlanc, David and Viega, John},
  79. journal={Programming Flaws and How to Fix Them},
  80. year={2005}
  81. }
  82. @article{ling2017security,
  83. title={Security vulnerabilities of internet of things: A case study of the smart plug system},
  84. author={Ling, Zhen and Luo, Junzhou and Xu, Yiling and Gao, Chao and Wu, Kui and Fu, Xinwen},
  85. journal={IEEE Internet of Things Journal},
  86. volume={4},
  87. number={6},
  88. pages={1899--1909},
  89. year={2017},
  90. publisher={IEEE}
  91. }
  92. @inproceedings{knieriem2017overview,
  93. title={An overview of the usage of default passwords},
  94. author={Knieriem, Brandon and Zhang, Xiaolu and Levine, Philip and Breitinger, Frank and Baggili, Ibrahim},
  95. booktitle={International Conference on Digital Forensics and Cyber Crime},
  96. pages={195--203},
  97. year={2017},
  98. organization={Springer}
  99. }
  100. @article{ahmad2015,
  101. title={A case analysis of information systems and security incident responses},
  102. author={Ahmad, Atif and Maynard, Sean B and Shanks, Graeme},
  103. journal={International Journal of Information Management},
  104. volume={35},
  105. number={6},
  106. pages={717--723},
  107. year={2015},
  108. publisher={Elsevier}
  109. }