Academic literature on the topic 'Stuxnet'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Stuxnet.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Stuxnet"

1

Chen, T. M., and S. Abu-Nimeh. "Lessons from Stuxnet." Computer 44, no. 4 (2011): 91–93. http://dx.doi.org/10.1109/mc.2011.115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Balani, Zina, and Mohammed Nasseh Mohammed. "Enhancing Cybersecurity against Stuxnet in the Future of Cyberwarfare: A Combined Approach Using Firewalls and Intrusion Detection Systems." International Journal of Science and Business 28, no. 1 (2023): 21–30. http://dx.doi.org/10.58970/ijsb.2202.

Full text
Abstract:
Stuxnet is a highly customized malware developed to destroy centrifuges used in the Iranian nuclear program through SCADA systems. It infects a computer through a USB drive, making it effective for targeting air-gapped networks. Stuxnet is larger and more complex than an equivalent worm; it is created in several different programming languages, and some components are encrypted. The malware utilizes four unprecedented zero-day vulnerability attacks that exploit application security vulnerabilities before developers become aware of the vulnerability. Additionally, it employs advanced rootkit technology to conceal itself from users and antimalware software on both Windows and the control computer it targets. To strengthen cybersecurity, this study implemented and configured a combination of firewalls and intrusion detection systems (IDS) to enhance security against the Stuxnet malware. By integrating these security measures, the aim was to establish a robust defense against the sophisticated attack methods employed by Stuxnet. It is essential to continuously update and adapt these security measures as the threat landscape evolves. By remaining vigilant and proactive, organizations can effectively safeguard their systems from sophisticated threats like Stuxnet, bolstering their cybersecurity defenses.
APA, Harvard, Vancouver, ISO, and other styles
3

Denning, Dorothy E. "Stuxnet: What Has Changed?" Future Internet 4, no. 3 (2012): 672–87. http://dx.doi.org/10.3390/fi4030672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bhemavarapu, Sai Varun Reddy, and Agathamudi Vikram Naidu. "INVESTIGATING A NATION-SPONSORED CYBER ATTACK ON CRITICAL INFRASTRUCTURE: CASE STUDY AND ANALYSIS STUXNET WORM." International Journal of Engineering Applied Sciences and Technology 9, no. 09 (2025): 78–83. https://doi.org/10.33564/ijeast.2025.v09i09.013.

Full text
Abstract:
Stuxnet represents a paradigm shift in the landscape of cyber warfare, marking its entry as a groundbreaking cyber weapon with profound implications that extend far beyond its immediate targets. Initially discovered in 2010, this sophisticated piece of malware was uniquely designed to cause physical damage to Iran's nuclear enrichment facility, a feat that had never been achieved by any previous cyber attack. Its discovery unveiled a new frontier in digital warfare, where malicious code could cross the threshold from the digital realm into causing tangible, real-world destruction. This capability highlighted a critical vulnerability in national and international security infrastructures, challenging previously held notions about the nature, scope, and potential impact of cyber threats. As the first known cyber weapon to specifically target industrial control systems, Stuxnet opened a Pandora's box in cybersecurity, setting a precedent for how state actors could leverage digital tools to achieve strategic geopolitical objectives, thereby redefining the contours of modern warfare. The implications of Stuxnet extend beyond its technical sophistication, resonating through the corridors of global geopolitics and international law. It served as a wake-up call, demonstrating the potential of cyber operations to disrupt critical national infrastructures and influence global power dynamics without a single soldier setting foot on enemy soil. The attack not only exposed the vulnerabilities of critical infrastructures to cyber intrusions but also raised complex ethical and legal questions about the use of digital weapons in statecraft. This incident spurred a global debate on the need for new international norms and regulations governing state conduct in cyberspace, highlighting a pressing need for a collective global response to secure critical infrastructure against emerging cyber threats. Stuxnet's legacy, therefore, lies anot just in its technical ingenuity but also in its role as a catalyst for a reevaluation of global cybersecurity strategies and the ethical boundaries of digital warfare.
APA, Harvard, Vancouver, ISO, and other styles
5

Kudláčková, Ivana. "Kybernetická zbraň: Přístupy k její definici." Revue pro právo a technologie 11, no. 21 (2020): 47–71. http://dx.doi.org/10.5817/rpt2020-1-3.

Full text
Abstract:
Odhalení počítačového červa Stuxnet v roce 2010 lze označit za zlomový okamžik, který zintenzivnil debaty o kybernetických zbraních. K těm je v odborné literatuře přistupováno různými způsoby, proto si tento příspěvek klade za cíl tyto rozdílné přístupy k definici pojmu kybernetická zbraň zmapovat a následně je aplikovat na reálné kybernetické incidenty.Právě odhalení Stuxnetu je pro svůj dopad výchozím bodem, od kterého byla prováděna rešerše literatury, která se zabývá pojmem kybernetická zbraň. Za tímto účelem byly analyzovány odborné příspěvky publikované v období let 2010-2019 zařazené vdatabázích DBLP Computer Science Bibliography Website, Scopus a Web of Science.Provedená analýza posloužila kpředstavení hlavních přístupů ke kybernetickým zbraním. Definice byly poté podrobeny analýze a byly identifikovány dva hlavní faktory způsobující názorový nesoulad.
APA, Harvard, Vancouver, ISO, and other styles
6

Kushner, David. "The real story of stuxnet." IEEE Spectrum 50, no. 3 (2013): 48–53. http://dx.doi.org/10.1109/mspec.2013.6471059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Xudong. "Stuxnet detected, Pc breaks down." Science China Life Sciences 59, no. 11 (2016): 1202–3. http://dx.doi.org/10.1007/s11427-016-5108-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Langner, Ralph. "Stuxnet: Dissecting a Cyberwarfare Weapon." IEEE Security & Privacy Magazine 9, no. 3 (2011): 49–51. http://dx.doi.org/10.1109/msp.2011.67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Grigalashvili, Jemal, Zaur Jojua, and Nino Jojua. "Analysis of the Security of Modern Automated Technological Processes Control Systems: Attack on a SCADA Object." Works of Georgian Technical University, no. 4(522) (December 21, 2021): 46–61. http://dx.doi.org/10.36073/1512-0996-2021-4-46-61.

Full text
Abstract:
(……) Modern automated technology process control systems and the chances of attacks on them are examined in this article. It studies worm virus, Stuxnet, and its detection at the Bushehr Nuclear Power Plant. It also analyzes ways of carrying out attacks on critically important objects, and provides analytical tools for the security of technological process systems. The ways for discovering nodes compromised by the Stuxnet virus are proposed. The article considers technological network of typical topology and its typical vulnerabilities; it analyzes the Modbus protocol, the routing system, and passwords on Cisco routers.
APA, Harvard, Vancouver, ISO, and other styles
10

Selján, Gábor. "The Remarkable 10th Anniversary of Stuxnet." Academic and Applied Research in Military and Public 19, no. 3 (2020): 85–98. http://dx.doi.org/10.32565/aarms.2020.3.6.

Full text
Abstract:
It has been ten years since Stuxnet, a highly sophisticated malware that was originally aimed at Iran’s nuclear facilities, was uncovered in 2010. Stuxnet is considered to be the first cyber weapon, used by a nation state threat actor in a politically motivated cyberattack. It has significantly changed the cybersecurity landscape, since it was the first publicly known malware that could cause physical damage to real processes or equipment. Its complexity and level of sophistication, due to the exploitation of four different zero-day vulnerabilities in Windows and the usage of two stolen certificates, has triggered a paradigm shift in the cybersecurity industry. The recently uncovered cyber espionage campaign known as SolarStorm is a worthy anniversary celebration for Stuxnet. Especially because now the tables have turned. This campaign targeted the United States Government and its interests with a highly sophisticated supply chain attack through the exploitation of the SolarWinds Orion Platform used by thousands of public and private sector customers for infrastructure monitoring and management. In this article, I attempt to summarise the key points about the malware deployed in the SolarStorm campaign that can be drawn from reports available at the time of the writing.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Stuxnet"

1

Ryd, Erik. "Stuxnet-attacken mot Iran : Strukturell realism i informationsrevolutionens tidsålder." Thesis, Försvarshögskolan, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-4458.

Full text
Abstract:
This study aims to explain the Stuxnet-attack against Iran in 2009-2010 by using the IR-theory of structural realism. By doing so the theory also faces the challenge of the impact of the information revolution on security and international relations. The structural realism that is at hand is that of Kenneth Waltz and his Theory of International Politics from 1979.The study reaches the conclusion that Waltzs focus on the structure of the international system and the distribution of capabilities applies well to the case of Stuxnet as a cyber attack. The creators of the sophisticated Stuxnet, USA and Israel, also indicates that when it comes to this certain aspect of the information revolution and IR, states seem to still be the main actor. Finally the character of one of the major features of the Stuxnet-attack; the internet, is shown to have an anarchic structure that fits well as an extension of the realist view of the international system.
APA, Harvard, Vancouver, ISO, and other styles
2

Thörn, Anders. "Militär vilseledning i den digitala miljön : En teoriprövande fallstudie om Stuxnet." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10162.

Full text
Abstract:
Genom mänsklighetens historia har krigsvetenskapliga teorier funnits för att förklara framgångarna med krig och krigföring. För att anpassas till de tekniska och taktiska framstegen som t.ex. skjutvapen, flygplan och kärnvapen har inneburit har dessa teorier löpande uppdaterats. En teori som funnits under lång tid är teorin om vilseledning. Denna studie gör en fallstudie på den strategiska operationen med trojanen Stuxnet som användes för att angripa Irans kärnanrikningsprogram 2007–2010. Då den tekniska utvecklingen, där mer och mer blivit digitalt och där kriget nu även inbegriper cyber, har teoriernas applicerbarhet återigen möjligen påverkats. Studien undersöker om teorier om vilseledning kan förklara framgången med operationen. Studien använder fyra författare i tre konstellationer som beskrivit vilseledning ur perspektiven (1) vilseledningens delar och (2) vilseledningens krav. Dessa teorier har jämkats till en teori och har sedan använts som utgångspunkt i en teoriprövande fallstudie varvid dessa prövats på fallet Stuxnet. Eftersom vilseledningsteorierna ursprungligen anpassats för en tid innan kriget blivit digitalt är studiens fall ett s.k. least likely case och kan, om teorin kan förklara framgången med Stuxnet, styrka teorins applicerbarhet i den nya kontexten som cyberkrigföringen innebär. Sammantaget visar studiens resultat att framgången med Stuxnet kan förklaras med såväl vilseledningens delar som dess krav. Därtill kan de identifierade misstagen med Stuxnet, både på operativ och teknisk nivå, förklaras med brister i vilseledningens krav. Detta gör att studiens teori kan förklara framgången i en militär operation i cyberdomänen. Därmed konstaterar studien att prövade teorier om vilseledning fortsatt är giltiga. Studien föreslår även hur studiens slutsats kan användas i ett defensivt syfte.
APA, Harvard, Vancouver, ISO, and other styles
3

Algebäck, Pontus. "Luftmaktsteori i cyberrymden : En fallstudie av Wardens teori på cyberattacken Stuxnet." Thesis, Försvarshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6790.

Full text
Abstract:
John A. Warden III is renowned as one of the theorists closest to devising a new paradigm in air power. His praised theory about the enemy as a system has showed applicable on terrorist organizations amongst other areas. The most recent developed domain for warfare is the so-called “cyberspace”. There is an on-going debate concerning the importance and definition of this domain and furthermore what potential and challenges it withholds as a future arena for warfare. Some claims that a cyberattack can’t be seen as an act of war due to its lack of physical violence. Previous research show however a lack in application of theories within this domain. This thesis therefore aims to examine to which extent Warden’s theory of the enemy as a system could be applied to the cyberattack known as Stuxnet. Results show that Warden’s theory have some applicatory power on the cyberattack Stuxnet, although primarily in an indirect aspect. This study therefore shows an ability concerning the theory’s applicatory power on other areas than air power. The findings of the research regarding previous arguments about cyberwar also states that a cyberattack now could be seen as physical violent.<br><p><strong>Uppsatsen skriven VT 2017 under Termin 4 Officersprogrammet 15-18 med inriktning </strong><strong>mot flyg. Examen genomförs VT 2018.</strong></p>
APA, Harvard, Vancouver, ISO, and other styles
4

Steiner, Hrafn. "Coercive instruments in the digital age : The cases of cyber-attacks against Estonia and Iran." Thesis, Försvarshögskolan, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-5273.

Full text
Abstract:
In the wake of the cyber-attacks in 2007 against Estonia and in 2010 against Iran, academics have debated the character of cyberwar. This study applies the theories of coercive diplomacy to the cases of Estonia and Iran in order to explain cyber-attacks as instrument for coercive diplomacy. While the long term effects of the attacks have yet to be understood it is clear that cyber-attacks can, and will, become a serious threat against political decision-makers in times of conflict.
APA, Harvard, Vancouver, ISO, and other styles
5

Akdag, Yavuz. "Cyber Deterrence against Cyberwar between the United States and China: A Power Transition Theory Perspective." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6993.

Full text
Abstract:
In the last three decades, states and societies have increasingly been connected to each other through Information and Communication Technologies (ICTs) such as satellites and the Internet, thus expanding the sphere of influence of cyberspace. While offering numerous economic and security benefits, this increased global connectivity also poses various security challenges and threats at the national and international level. In particular, the threat of cyberwar has become one of the top national security issues in both the United States and China, as reflected in an increasing number of cyber disputes between the two nations recently. In the wake of this emerging threat, scholars have turned to the classical deterrence strategies of Cold War to counter these new challenges, inspiring the development of cyber deterrence theory. However, numerous pundits in the cyber deterrence literature doubt the efficacy of cyber deterrence in hindering cyberwar. What theory or approach can offer the best explanatory framework for understanding the efficacy of cyber deterrence in forestalling cyberwar, specifically between the U.S. and China, is a question that remains unanswered. This study explores the effectiveness of cyber deterrence outside the bounds of classical deterrence and technological vulnerabilities in cyber systems and networks, and, then, offers Power Transition Theory (PTT) as an alternative approach to understanding whether cyber deterrence in the context of cyberwar between the rival antagonists can be successful. It answers the question of how PTT can allow us to better understand the effectiveness of cyber deterrence in preventing cyberwar between the United States and China. A cyber application of PTT argues that cyber deterrence is largely an ineffective approach to preventing potential cyberwar between the U.S. and China, particularly if the latter achieves parity in offensive cyberwar capability with the former while concurrently remaining dissatisfied with the status quo in cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhuk, Alesia. "Does international human rights law impose constraints on digital manipulation or other cyberwarfare ruses? Analysis of the stuxnet worm attack on iranian nuclear facilities." Tesis, Universidad de Chile, 2017. http://repositorio.uchile.cl/handle/2250/170163.

Full text
Abstract:
Tesis (magíster en derecho económico, inversiones, comercio y arbitraje internacional) Universidad de Chile, Universidad de Heidelberg<br>In 2010 a malicious computer worm attacked Iranian nuclear facilities in Natanz. It was the first computer worm that caused physical damage, and because of this, Iran had to suspend its nuclear program approximately for two years. The case caused great concern among the international community and raised the issue of protecting the population. This paper will address the issues of cyber war and its relationship with International Humanitarian Law and International Human Rights Law.
APA, Harvard, Vancouver, ISO, and other styles
7

Rubin, Willa. "Waging Wars in Cyberspace: How International Law On Aggression And Self-Defense Falls Short Of Addressing Cyber Warfare.Could Iran Legally Retaliate For The Stuxnet Attack?" Oberlin College Honors Theses / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=oberlin1462921585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Davis, Brandon S. "State Cyber Operations and International Law: Russian and Western Approaches." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1523531316393533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Jonathan Iming. "Evaluating Cyber war." Thesis, 2010. http://hdl.handle.net/2152/ETD-UT-2010-12-2436.

Full text
Abstract:
Richard A. Clarke and Robert K. Knake’s book, Cyber war, claims to identify a new threat and vulnerability in the United States. By examining the points they make and evaluating them in the context of the first cyber attack, STUXNET, we shall conclude that the technical argument is correct; however the overall argument is incomplete. What they fail to emphasize is the amount of human intelligence involved in committing a successful cyber attack, and the extent to which having intelligence operations greatly enhances a state's cyber capabilities.<br>text
APA, Harvard, Vancouver, ISO, and other styles
10

Duque, Pedro. "Desenvolvimento de Front-End para Avaliação da Cibersegurança dos Industrial Control Systems." Bachelor's thesis, 2019. http://hdl.handle.net/10884/1472.

Full text
Abstract:
Os Industrial Control Systems (ICS) são essenciais para as sociedades atuais e suas infraestruturas. É por isso crucial garantir a sua Cibersegurança, necessitando que sejam implementadas medidas específicas adaptadas à realidade operacional de cada organização. Para facilitar o trabalho dos técnicos de Cibersegurança e dos responsáveis dos diversos ICS, foi criado um protótipo aplicacional, intitulado de “Avaliação da Cibersegurança dos Industrial Control Systems”. Neste protótipo, os utilizadores têm acesso à lista completa de medidas a tomar para aumentar a segurança destes sistemas, estando estas divididas por secções. Através de um sistema simples de input de dados, estes têm acesso, em tempo real, à visualização gráfica da percentagem das medidas implementadas. O protótipo foi criado tendo por base HTML com PHP e MySQL e estando disponível online em http://questionarioics.epizy.com/. De modo a proceder à validação do protótipo aplicacional, foi pedido que especialistas da área da Informática e dos ICS que o testassem, tendo sido depois integradas as suas conclusões e considerações neste trabalho.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Stuxnet"

1

Chen, Thomas M., and Strategic Studies Institute. Cyberterrorism after STUXNET. Independently Published, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cyberterrorism after Stuxnet. Lulu Press, Inc., 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jenkinson, Andrew. Stuxnet to Sunburst. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jenkinson, Andrew. Stuxnet to Sunburst. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cyberterrorism After STUXNET. Department of the Army, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hollenbeck, Xavier, Harrison Dreggs, and Ted Hobson. Cyber Attack Threat Trends: Stuxnet. Lulu Press, Inc., 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kuzei, Alina. Stuxnet. Mit Völkerrecht Gegen Schläfer-Viren. GRIN Verlag GmbH, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stuxnet: The True Story of Hunt and Evolution. Outskirts Press, Incorporated, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rebane, Jackson C. Stuxnet Computer Worm and Industrial Control System Security. Nova Science Publishers, Incorporated, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Langner, Ralph. Robust Control System Networks: How to Achieve Reliable Control after Stuxnet. Momentum, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Stuxnet"

1

Jenkinson, A. J. "Stuxnet." In Digital Blood on Their Hands. CRC Press, 2022. http://dx.doi.org/10.1201/9781003323273-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haataja, Samuli. "Stuxnet." In Cyber Attacks and International Law on the Use of Force. Routledge, 2018. http://dx.doi.org/10.4324/9781351057028-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moallem, Abbas. "Stuxnet." In Human Factors Analysis of 23 Cyberattacks. CRC Press, 2025. https://doi.org/10.1201/9781003461739-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jenkinson, Andrew. "Stuxnet to Sunburst." In Stuxnet to Sunburst. CRC Press, 2021. http://dx.doi.org/10.1201/9781003204145-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jenkinson, Andrew. "Cyberattack Fatigue." In Stuxnet to Sunburst. CRC Press, 2021. http://dx.doi.org/10.1201/9781003204145-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jenkinson, Andrew. "PRISM, Project Aurora, and Early Digital Offensive Capability." In Stuxnet to Sunburst. CRC Press, 2021. http://dx.doi.org/10.1201/9781003204145-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jenkinson, Andrew. "Did Someone Say Critical National Infrastructure and Nuclear Power." In Stuxnet to Sunburst. CRC Press, 2021. http://dx.doi.org/10.1201/9781003204145-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jenkinson, Andrew. "9/11 and the Creation of Mass Data Collection in the Name of Security…" In Stuxnet to Sunburst. CRC Press, 2021. http://dx.doi.org/10.1201/9781003204145-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jenkinson, Andrew. "Marriott and Cyber Insurance: a Fragile Prop." In Stuxnet to Sunburst. CRC Press, 2021. http://dx.doi.org/10.1201/9781003204145-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jenkinson, Andrew. "Making the Matter Far Worse (IoT and 5G)." In Stuxnet to Sunburst. CRC Press, 2021. http://dx.doi.org/10.1201/9781003204145-20.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Stuxnet"

1

Rai, Preeti, and Vishal Nain. "Stuxnet Unveiled: The Blueprint for Modern Cyber Conflict." In 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON). IEEE, 2024. https://doi.org/10.1109/delcon64804.2024.10866904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Clark, Andrew, Quanyan Zhu, Radha Poovendran, and Tamer Basar. "An impact-aware defense against Stuxnet." In 2013 American Control Conference (ACC). IEEE, 2013. http://dx.doi.org/10.1109/acc.2013.6580475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yannakogeorgos, Panayotis A., and Eneken Tikk. "Stuxnet as cyber-enabled sanctions enforcement." In 2016 International Conference on Cyber Conflict (CyCon U.S.). IEEE, 2016. http://dx.doi.org/10.1109/cyconus.2016.7836630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Masood, Rahat, Um-e-Ghazia, and Zahid Anwar. "SWAM: Stuxnet Worm Analysis in Metasploit." In 2011 Frontiers of Information Technology (FIT). IEEE, 2011. http://dx.doi.org/10.1109/fit.2011.34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Guangwei, Hong Pan, and Mingyu Fan. "Dynamic Analysis of a Suspected Stuxnet Malicious Code." In 3rd International Conference on Computer Science and Service System. Atlantis Press, 2014. http://dx.doi.org/10.2991/csss-14.2014.86.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Karnouskos, Stamatis. "Stuxnet worm impact on industrial cyber-physical system security." In IECON 2011 - 37th Annual Conference of IEEE Industrial Electronics. IEEE, 2011. http://dx.doi.org/10.1109/iecon.2011.6120048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kriaa, Siwar, Marc Bouissou, and Ludovic Pietre-Cambacedes. "Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments." In 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, 2012. http://dx.doi.org/10.1109/crisis.2012.6378942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Faily, Shamal, and Ivan Flechais. "User-Centered Information Security Policy Development in a Post-Stuxnet World." In 2011 Sixth International Conference on Availability, Reliability and Security (ARES). IEEE, 2011. http://dx.doi.org/10.1109/ares.2011.111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Junling, Xinxin Chang, Lei Zhong, and Kaifa Zeng. "A Stuxnet-style malware propagation modeling study based on Tesla autonomous vehicles." In Third International Conference on Computer Technology, Information Engineering, and Electron Materials (CTIEEM 2023), edited by Atsushi Inoue. SPIE, 2024. http://dx.doi.org/10.1117/12.3023368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Thapliyal, Nachiket, and Sumit Dhariwal. "Protecting A Nuclear Power Plant Against A Stuxnet Attack: Power Of Computer Security." In 2023 International Conference on Communication, Security and Artificial Intelligence (ICCSAI). IEEE, 2023. http://dx.doi.org/10.1109/iccsai59793.2023.10421224.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Stuxnet"

1

Chen, Thomas M. Cyberterrorism After Stuxnet. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada603165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Morton, Grady Jr O. Cyberspace Operations, Stuxnet, Jus ad Bellum and Jus in Bello. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ad1018827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!