References
- Agossah A, Krupa F, Perreira da Silva M, Le Callet, P. LLM-based interaction for content generation: a case study on the perception of employees in an IT department. Proceedings of the 2023 ACM International Conference on Interactive Media Experiences; June; 2023. p. 237–241.
- Ariu D, Frumento E, Fumera G. Social engineering 2.0: a foundational work, In: Proceedings of the Computing Frontiers Conference, Siena, Italy; 2017.
- ESET. ESET Research APT activity report Q4 2022–Q1; 2023 May. p.5.
- NISOS. Fronton: a botnet for creation, command, and control of coordinated inauthentic behavior. 2022 May.
- Hazell J. Large language models can be used to effectively scale spear phishing campaigns. ArXiv Prepr ArXiv230506972. 2023.
- Tsagourias N, Farrell M. Cyber attribution: technical and legal approaches and challenges. Eur J Int Law. 2020;31(3):941–967. doi:10.1093/ejil/chaa057
- Lu C, Zhang LA. Chinese perspective on public cyber attribution. China Q Int Strateg Stud. 2022 Jan;8(01):61–77. doi: 10.1142/S2377740022500026
- Dunn Cavelty M. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities. Sci Eng Ethics. 2014 Sep;20(3):701–715. doi: 10.1007/s11948-014-9551-y
- Lancelot JF. Cyber-diplomacy: cyberwarfare and the rules of engagement. J Cyber Secur. 2020 Oct;4(4):240–254. doi: 10.1080/23742917.2020.1798155
- Canfil JK. Honing cyber attribution: a framework for assessing foreign state complicity. J Int Aff. 2016;70(1):217–226.
- Lin H. Attribution of malicious cyber incidents. National Security, Technology, and Law. 2016.
- Egloff FJ. Public attribution of cyber intrusions. J Cybersecur. 2020 Jan;6(1):tyaa012. doi: 10.1093/cybsec/tyaa012
- Davis JI, Boudreaux BA, Welburn JW, et al. Stateless attribution: toward international accountability in cyberspace. Arlington United States (VA): Rand Corporation Arlington; 2017.
- Poznansky M, Perkoski E. Rethinking secrecy in cyberspace: the politics of voluntary attribution. J Glob Secur Stud. 2018 Oct;3(4):402–416. doi: 10.1093/jogss/ogy022
- Egloff FJ, Smeets M. Publicly attributing cyber attacks: a framework. J Strateg Stud. 2021 Mar;1–32. doi: 10.1080/01402390.2021.1895117
- Edwards B, Furnas A, Forrest S, et al. Strategic aspects of cyberattack, attribution, and blame. Proc Natl Acad Sci. 2017 Mar;114(11):2825–2830. doi: 10.1073/pnas.1700442114
- Nunes E, Shakarian P, Simari GI, et al. Argumentation models for cyber attribution. In: 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), San Francisco, CA, USA. IEEE; 2016, pp. 837–844.
- Rauti S, Towards cyber attribution by deception In: Hybrid Intelligent Systems: 19th International Conference on Hybrid Intelligent Systems (HIS 2019) held in Bhopal; 2019 Dec 10-12; 19, India: Springer, 2021, pp. 419–428.
- Rosenberg I, Sicard G, David E. DeepAPT: nation-state APT attribution using end-to-end deep neural networks. 2017;10614:91–99. doi: 10.1007/978-3-319-68612-7_11
- Dowling S, Schukat M, Barrett E. Improving adaptive honeypot functionality with efficient reinforcement learning parameters for automated malware. J Cyber Secur. 2018 Apr;2(2):75–91. doi: 10.1080/23742917.2018.1495375
- Warikoo A. The triangle model for cyber threat attribution. J Cyber Secur. 2021 Oct;5(3–4):191–208. doi: 10.1080/23742917.2021.1895532
- Soto-Valero C, González M. Empirical study of malware diversity in major android markets. J Cyber Secur. 2018 Apr;2(2):51–74. doi: 10.1080/23742917.2018.1483876
- Goel S, Nussbaum B. Attribution across cyber attack types: network intrusions and information operations. IEEE Open J Commun Soc. 2021;2:1082–1093. doi:10.1109/OJCOMS.2021.3074591
- Steffens T. Attribution of advanced persistent threats: how to identify the actors behind cyber-espionage. Berlin Heidelberg: Springer; 2020. doi: 10.1007/978-3-662-61313-9.
- Hare F. The significance of attribution to cyberspace coercion: A political perspective. In: 2012 4th International Conference on Cyber Conflict (CYCON 2012), Talinn, Estonia. IEEE; 2012, pp. 1–15.
- Oosthoek K, Doerr C. Cyber threat intelligence: a product without a process? J Intell CounterIntelligence. 2021 Apr;34(2):300–315. doi: 10.1080/08850607.2020.1780062
- Virilio P, Lotringer S. Pure War, new and updated. In: Semiotext(e) foreign agents series. 0th ed. Los Angeles (CA): Semiotext(e); 2008.
- Morley D, Robins K. Spaces of identity: global media, electronic landscapes and cultural boundaries. London: Routledge; 2002.
- Henry NL. Knowledge management: a new concern for public administration. Public Adm Rev. 1974;34(3):189–196. doi: 10.2307/974902
- Star SL, Griesemer JR. Institutional ecology, `Translations’ and boundary objects: amateurs and professionals in Berkeley’s Museum of Vertebrate Zoology, 1907-39. Soc Stud Sci. 1989;19(3):387–420. doi:10.1177/030631289019003001
- White House T. National cybersecurity strategy. Mar. 2023.
- Selby J. Data localization laws: trade barriers or legitimate responses to cybersecurity risks, or both? Int J Law Inf Technol. 2017;25(3):213–232. doi:10.1093/ijlit/eax010
- Wu E. Sovereignty and data localization. Cambridge (MA): The Belfer Center for Science and International Affairs Harvard Kennedy School; 2021. Available from: https://www.BelfercenterOrgpublicationsovereigntyand-Data-Localization
- Alam MT, Bhusal D, Park Y, et al. Looking beyond IoCs: automatically extracting attack patterns from external CTI. arXiv. [ updated 2022 Nov 1; cited 2023 Jun 24]. Available from: http://arxiv.org/abs/2211.01753
- Koloveas P, Chantzios T, Alevizopoulou S, et al. inTIME: a machine learning-based framework for gathering and leveraging web data to cyber-threat intelligence. Electronics. 2021 Mar;10(7):818. doi: 10.3390/electronics10070818
- Velasco E, Agheneza T, Denecke K, et al. Social media and internet-based data in global systems for public health surveillance: a systematic review: social media and internet-based data for public health surveillance. Milbank Q. 2014 Mar;92(1):7–33. doi: 10.1111/1468-0009.12038
- Kandias M, Stavrou V, Bozovic N, et al. Proactive insider threat detection through social media: the YouTube case. In: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society; Nov; Berlin Germany: ACM; 2013. pp. 261–266. doi: 10.1145/2517840.2517865.
- Agyepong E, Cherdantseva Y, Reinecke P, et al. Challenges and performance metrics for security operations center analysts: a systematic review. J Cyber Secur. 2020 Jul;4(3):125–152. doi: 10.1080/23742917.2019.1698178
- Ahmad A, Webb J, Desouza KC, et al. Strategically-motivated advanced persistent threat: definition, process, tactics and a disinformation model of counterattack. Comput Secur. 2019 Sep;86:402–418. doi: 10.1016/j.cose.2019.07.001
- Schmidt R, Rattray GJ, Fogle CJ. Methods and apparatus for developing cyber defense processes and a cadre of expertise. U.S. Patent Application 11/947,655. 2008 Jul 10.
- Walsh K. Northrop Grumman’s Timothy McKnight on security and identity management, CSO Online. [cited 2022 Aug 22]. Available from: https://www.csoonline.com/article/2122398/northrop-grumman-s-timothy-mcknight-on-security-and-identity-management.html
- Gallagher S, Candid camera: Dutch hacked Russians hacking DNC, including security cameras, Ars Technica. [cited 2023 Jun 09]. Available from: https://arstechnica.com/information-technology/2018/01/dutch-intelligence-hacked-video-cameras-in-office-of-russians-who-hacked-dnc/
- Mandiant. APT1 exposing one of China’s cyber espionage units. 2013;76. https://www.FireeyeComcontentdamfireeye-Www.servicespdfsmandiant-Apt1-Rep.Pdf
- Day K, The think tank that went out for a SPIN, Washington Post, [ updated 1996 Feb 23; cited 2023 Feb. 19]. Available from: https://www.washingtonpost.com/archive/business/1996/02/23/the-think-tank-that-went-out-for-a-spin/b117b3f3-a72b-44cc-9002-fb118d2aadcf/
- Herley C. The plight of the targeted attacker in a world of scale. 9th Workshop on the Economics of Information Security (WEIS), Harvard University, USA. 2010.
- Seymour J, Tully P, Generative models for spear phishing posts on social media. arXiv. [ updated 2018 Feb 14; cited 2023 Jun 24]. Available from: http://arxiv.org/abs/1802.05196
- Aleroud A, Zhou L. Phishing environments, techniques, and countermeasures: A survey. Comput Secur. 2017 Jul;68:160–196. doi: 10.1016/j.cose.2017.04.006
- Chaudhry JA, Rittenhouse RG, Phishing: classification and countermeasures, In: 2015 7th International Conference on Multimedia, Computer Graphics and Broadcasting (MulGraB), Jeju Island, South Korea: IEEE, Nov. 2015, pp. 28–31. doi: 10.1109/MulGraB.2015.17
- Steer J. Defending against spear-phishing. Comput Fraud Secur. 2017 Aug;2017(8):18–20. doi: 10.1016/S1361-3723(17)30074-X
- Hubert B. NL government wants to abandon key safeguards for hacking of non-targets. About: intel. [ cited 2023 Jun 25]. Available from: https://aboutintel.eu/nl-government-wants-to-abandon-key-safeguards-for-hacking-of-non-targets/
- Shavit Y. What does it take to catch a chinchilla? verifying rules on large-scale neural network training via compute monitoring. arXiv. [ updated 2023 May 30; cited 2023 Jun 24]. Available from: http://arxiv.org/abs/2303.11341
- Lessing A. What is wrong with a forgery? J Aesthet Art Crit. 1965;23(4):461. doi:10.1111/1540_6245.jaac23.4.0461
- Rigaki M. Arming malware with GANs, In: Security Session. Apr 2018. [cited 2021 Oct 19]. Available from: https://www.stratosphereips.org/publications/2018/5/5/arming-malware-with-gans
- Clegg N. Meta launches new content moderation tool as it takes chair of counter-terrorism NGO, Meta. [cited 2023 Jun 25]. Available from: https://about.fb.com/news/2022/12/meta-launches-new-content-moderation-tool/
- Barnett M, Duvall, R, editors. Power in global governance. vol. 98. Cambridge University Press; 2004. p. 1–32.
- Imperva, Imperva Bad Bot Report. 2022.
- Thomas K, Nicol DM. The Koobface botnet and the rise of social malware, In: 2010 5th International Conference on Malicious and Unwanted Software. Nancy, France, IEEE, 2010, pp. 63–70.
- FireEye TI. HAMMERTOSS: stealthy tactics define a Russian cyber threat group. Milpitas (CA): FireEye; 2015.
- Jalili M, Perc M. Information cascades in complex networks. J Complex Netw. 2017;5(5):665–693. doi:10.1093/comnet/cnx019
- Ferrara E, Varol O, Davis C, et al. The rise of social bots. Commun ACM. 2016;59(7):96–104. doi:10.1145/2818717
- Meta. Quarterly adversarial threat report. Meta. 2022 Nov; Available from: https://about.fb.com/wp-content/uploads/2022/11/Quarterly-Adversarial-Threat-Report-Q2-2022-1.pdf
- Graphika and Stanford Internet Observatory. Unheard voice: evaluating five years of pro-western covert influence operations. Stanford Digital Repository. 2022. doi:10.25740/NJ914NX9540
- Levin DH. Partisan electoral interventions by the great powers: introducing the PEIG dataset. Confl Manag Peace Sci. 2019;36(1):88–106.
- Khaund T, Al-Khateeb S, Tokdemir S, et al. Analyzing social bots and their coordination during natural disasters. In: Thomson R, Dancy C, Hyder A Bisgin H, editors. Social, cultural, and behavioral modeling. Vol. 10899. Lecture Notes in Computer Science, Cham: Springer International Publishing; 2018. pp. 207–212. doi:10.1007/978-3-319-93372-6_23.
- Zhang M, Qi X, Chen Z, et al. Social bots’ involvement in the COVID-19 vaccine discussions on twitter. Int J Environ Res Public Health. 2022;19(3):1651. doi:10.3390/ijerph19031651
- Miloslavskaya N, Morozov V, Tolstoy A, et al. DLP as an Integral Part of Network Security Intelligence Center. In 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), Prague: IEEE; 2017 Aug. pp. 297–304. doi: 10.1109/FiCloud.2017.15.
- SecureList. ProjectSauron: top level cyber-espionage platform covertly extracts encrypted government comms. [cited 2023 Jun 25]. Available from: https://securelist.com/faq-the-projectsauron-apt/75533/
- Emm D, Unuchek R, Garnaeva M, et al. IT threat evolution in Q3 2016. Kaspersky Labs Mosc Russ Tech Rep. 2016.
- Pitts J. Repurposing OnionDuke: a single case study around reusing nation state malware. Black Hat, USA. 2015;22.
- Taylor RC. Intelligence-sharing agreements & international data protection: avoiding a global surveillance state. Wash U Glob Stud Rev. 2018;17:731.
- Verma P. AI can draw hands now. That’s bad news for deep-fakes. Washington Post. [cited 2023 Dec 7]. Available from: https://www.washingtonpost.com/technology/2023/03/26/ai-generated-hands-midjourney/
- Mi D. Google, “SynthID”, Google DeepMind. [cited 2023 Dec. 7]. Available from: https://deepmind.google/technologies/synthid/
- Burt T. New cyberattacks targeting U.S. elections. Microsoft On The Issues. [cited 2023 Jun 25]. Available from: https://blogs.microsoft.com/on-the-issues/2020/09/10/cyberattacks-us-elections-trump-biden/
- Itkin E. The story of jian - how APT31 stole and used an unknown equation group 0-day. Check Point Research. [cited 2023 Jun 25]. Available from: https://research.checkpoint.com/2021/the-story-of-jian/
- Yadav S. Socialbots and the challenges of cyberspace awareness. arXiv, [ updated 2023 Mar 05; cited: 2023 Apr 29]. Available from: http://arxiv.org/abs/2303.02609
- StratComcoe N. Foreign information manipulation and interference defence standards: test for rapid adoption of the common language and framework ‘DISARM.’ [cited 2023 Feb 19]. Available from: https://stratcomcoe.org/publications/foreign-information-manipulation-and-interference-defence-standards-test-for-rapid-adoption-of-the-common-language-and-framework-disarm-prepared-in-cooperation-with-hybrid-coe/253
- Lesser M. Cognitive security operations centers (CogSocs). Disarming Disinformation. [cited 2023 Oct 10]. Available from: https://medium.com/disarming-disinformation/cognitive-security-operations-centers-cogsocs-20ff7489ce81