Academic literature on the topic 'Stuxnet'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Stuxnet.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Stuxnet"
Chen, T. M., and S. Abu-Nimeh. "Lessons from Stuxnet." Computer 44, no. 4 (2011): 91–93. http://dx.doi.org/10.1109/mc.2011.115.
Full textBalani, Zina, and Mohammed Nasseh Mohammed. "Enhancing Cybersecurity against Stuxnet in the Future of Cyberwarfare: A Combined Approach Using Firewalls and Intrusion Detection Systems." International Journal of Science and Business 28, no. 1 (2023): 21–30. http://dx.doi.org/10.58970/ijsb.2202.
Full textDenning, Dorothy E. "Stuxnet: What Has Changed?" Future Internet 4, no. 3 (2012): 672–87. http://dx.doi.org/10.3390/fi4030672.
Full textBhemavarapu, Sai Varun Reddy, and Agathamudi Vikram Naidu. "INVESTIGATING A NATION-SPONSORED CYBER ATTACK ON CRITICAL INFRASTRUCTURE: CASE STUDY AND ANALYSIS STUXNET WORM." International Journal of Engineering Applied Sciences and Technology 9, no. 09 (2025): 78–83. https://doi.org/10.33564/ijeast.2025.v09i09.013.
Full textKudláčková, Ivana. "Kybernetická zbraň: Přístupy k její definici." Revue pro právo a technologie 11, no. 21 (2020): 47–71. http://dx.doi.org/10.5817/rpt2020-1-3.
Full textKushner, David. "The real story of stuxnet." IEEE Spectrum 50, no. 3 (2013): 48–53. http://dx.doi.org/10.1109/mspec.2013.6471059.
Full textWu, Xudong. "Stuxnet detected, Pc breaks down." Science China Life Sciences 59, no. 11 (2016): 1202–3. http://dx.doi.org/10.1007/s11427-016-5108-4.
Full textLangner, Ralph. "Stuxnet: Dissecting a Cyberwarfare Weapon." IEEE Security & Privacy Magazine 9, no. 3 (2011): 49–51. http://dx.doi.org/10.1109/msp.2011.67.
Full textGrigalashvili, Jemal, Zaur Jojua, and Nino Jojua. "Analysis of the Security of Modern Automated Technological Processes Control Systems: Attack on a SCADA Object." Works of Georgian Technical University, no. 4(522) (December 21, 2021): 46–61. http://dx.doi.org/10.36073/1512-0996-2021-4-46-61.
Full textSelján, Gábor. "The Remarkable 10th Anniversary of Stuxnet." Academic and Applied Research in Military and Public 19, no. 3 (2020): 85–98. http://dx.doi.org/10.32565/aarms.2020.3.6.
Full textDissertations / Theses on the topic "Stuxnet"
Ryd, Erik. "Stuxnet-attacken mot Iran : Strukturell realism i informationsrevolutionens tidsålder." Thesis, Försvarshögskolan, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-4458.
Full textThörn, Anders. "Militär vilseledning i den digitala miljön : En teoriprövande fallstudie om Stuxnet." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10162.
Full textAlgebäck, Pontus. "Luftmaktsteori i cyberrymden : En fallstudie av Wardens teori på cyberattacken Stuxnet." Thesis, Försvarshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6790.
Full textSteiner, Hrafn. "Coercive instruments in the digital age : The cases of cyber-attacks against Estonia and Iran." Thesis, Försvarshögskolan, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-5273.
Full textAkdag, Yavuz. "Cyber Deterrence against Cyberwar between the United States and China: A Power Transition Theory Perspective." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6993.
Full textZhuk, Alesia. "Does international human rights law impose constraints on digital manipulation or other cyberwarfare ruses? Analysis of the stuxnet worm attack on iranian nuclear facilities." Tesis, Universidad de Chile, 2017. http://repositorio.uchile.cl/handle/2250/170163.
Full textRubin, Willa. "Waging Wars in Cyberspace: How International Law On Aggression And Self-Defense Falls Short Of Addressing Cyber Warfare.Could Iran Legally Retaliate For The Stuxnet Attack?" Oberlin College Honors Theses / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=oberlin1462921585.
Full textDavis, Brandon S. "State Cyber Operations and International Law: Russian and Western Approaches." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1523531316393533.
Full textLee, Jonathan Iming. "Evaluating Cyber war." Thesis, 2010. http://hdl.handle.net/2152/ETD-UT-2010-12-2436.
Full textDuque, Pedro. "Desenvolvimento de Front-End para Avaliação da Cibersegurança dos Industrial Control Systems." Bachelor's thesis, 2019. http://hdl.handle.net/10884/1472.
Full textBooks on the topic "Stuxnet"
Chen, Thomas M., and Strategic Studies Institute. Cyberterrorism after STUXNET. Independently Published, 2014.
Find full textHollenbeck, Xavier, Harrison Dreggs, and Ted Hobson. Cyber Attack Threat Trends: Stuxnet. Lulu Press, Inc., 2015.
Find full textKuzei, Alina. Stuxnet. Mit Völkerrecht Gegen Schläfer-Viren. GRIN Verlag GmbH, 2014.
Find full textStuxnet: The True Story of Hunt and Evolution. Outskirts Press, Incorporated, 2013.
Find full textRebane, Jackson C. Stuxnet Computer Worm and Industrial Control System Security. Nova Science Publishers, Incorporated, 2011.
Find full textLangner, Ralph. Robust Control System Networks: How to Achieve Reliable Control after Stuxnet. Momentum, 2011.
Find full textBook chapters on the topic "Stuxnet"
Jenkinson, A. J. "Stuxnet." In Digital Blood on Their Hands. CRC Press, 2022. http://dx.doi.org/10.1201/9781003323273-14.
Full textHaataja, Samuli. "Stuxnet." In Cyber Attacks and International Law on the Use of Force. Routledge, 2018. http://dx.doi.org/10.4324/9781351057028-6.
Full textMoallem, Abbas. "Stuxnet." In Human Factors Analysis of 23 Cyberattacks. CRC Press, 2025. https://doi.org/10.1201/9781003461739-11.
Full textJenkinson, Andrew. "Stuxnet to Sunburst." In Stuxnet to Sunburst. CRC Press, 2021. http://dx.doi.org/10.1201/9781003204145-15.
Full textJenkinson, Andrew. "Cyberattack Fatigue." In Stuxnet to Sunburst. CRC Press, 2021. http://dx.doi.org/10.1201/9781003204145-11.
Full textJenkinson, Andrew. "PRISM, Project Aurora, and Early Digital Offensive Capability." In Stuxnet to Sunburst. CRC Press, 2021. http://dx.doi.org/10.1201/9781003204145-3.
Full textJenkinson, Andrew. "Did Someone Say Critical National Infrastructure and Nuclear Power." In Stuxnet to Sunburst. CRC Press, 2021. http://dx.doi.org/10.1201/9781003204145-10.
Full textJenkinson, Andrew. "9/11 and the Creation of Mass Data Collection in the Name of Security…" In Stuxnet to Sunburst. CRC Press, 2021. http://dx.doi.org/10.1201/9781003204145-2.
Full textJenkinson, Andrew. "Marriott and Cyber Insurance: a Fragile Prop." In Stuxnet to Sunburst. CRC Press, 2021. http://dx.doi.org/10.1201/9781003204145-8.
Full textJenkinson, Andrew. "Making the Matter Far Worse (IoT and 5G)." In Stuxnet to Sunburst. CRC Press, 2021. http://dx.doi.org/10.1201/9781003204145-20.
Full textConference papers on the topic "Stuxnet"
Rai, Preeti, and Vishal Nain. "Stuxnet Unveiled: The Blueprint for Modern Cyber Conflict." In 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON). IEEE, 2024. https://doi.org/10.1109/delcon64804.2024.10866904.
Full textClark, Andrew, Quanyan Zhu, Radha Poovendran, and Tamer Basar. "An impact-aware defense against Stuxnet." In 2013 American Control Conference (ACC). IEEE, 2013. http://dx.doi.org/10.1109/acc.2013.6580475.
Full textYannakogeorgos, Panayotis A., and Eneken Tikk. "Stuxnet as cyber-enabled sanctions enforcement." In 2016 International Conference on Cyber Conflict (CyCon U.S.). IEEE, 2016. http://dx.doi.org/10.1109/cyconus.2016.7836630.
Full textMasood, Rahat, Um-e-Ghazia, and Zahid Anwar. "SWAM: Stuxnet Worm Analysis in Metasploit." In 2011 Frontiers of Information Technology (FIT). IEEE, 2011. http://dx.doi.org/10.1109/fit.2011.34.
Full textWang, Guangwei, Hong Pan, and Mingyu Fan. "Dynamic Analysis of a Suspected Stuxnet Malicious Code." In 3rd International Conference on Computer Science and Service System. Atlantis Press, 2014. http://dx.doi.org/10.2991/csss-14.2014.86.
Full textKarnouskos, Stamatis. "Stuxnet worm impact on industrial cyber-physical system security." In IECON 2011 - 37th Annual Conference of IEEE Industrial Electronics. IEEE, 2011. http://dx.doi.org/10.1109/iecon.2011.6120048.
Full textKriaa, Siwar, Marc Bouissou, and Ludovic Pietre-Cambacedes. "Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments." In 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, 2012. http://dx.doi.org/10.1109/crisis.2012.6378942.
Full textFaily, Shamal, and Ivan Flechais. "User-Centered Information Security Policy Development in a Post-Stuxnet World." In 2011 Sixth International Conference on Availability, Reliability and Security (ARES). IEEE, 2011. http://dx.doi.org/10.1109/ares.2011.111.
Full textWang, Junling, Xinxin Chang, Lei Zhong, and Kaifa Zeng. "A Stuxnet-style malware propagation modeling study based on Tesla autonomous vehicles." In Third International Conference on Computer Technology, Information Engineering, and Electron Materials (CTIEEM 2023), edited by Atsushi Inoue. SPIE, 2024. http://dx.doi.org/10.1117/12.3023368.
Full textThapliyal, Nachiket, and Sumit Dhariwal. "Protecting A Nuclear Power Plant Against A Stuxnet Attack: Power Of Computer Security." In 2023 International Conference on Communication, Security and Artificial Intelligence (ICCSAI). IEEE, 2023. http://dx.doi.org/10.1109/iccsai59793.2023.10421224.
Full textReports on the topic "Stuxnet"
Chen, Thomas M. Cyberterrorism After Stuxnet. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada603165.
Full textMorton, Grady Jr O. Cyberspace Operations, Stuxnet, Jus ad Bellum and Jus in Bello. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ad1018827.
Full text