ALMA MATER STUDIORUM - UNIVERSITÀ DI BOLOGNA CAMPUS DI CESENA SCUOLA DI INGEGNERIA ED ARCHITETTURA CORSO DI LAUREA MAGISTRALE IN INGEGNERIA INFORMATICA ICT Security: defence strategies against targeted attacks

[1]  Galen C. Hunt,et al.  Detours: binary interception of Win32 functions , 1999 .

[2]  Kevin Mandia,et al.  Incident Response & Computer Forensics, 2nd Ed. , 2003 .

[3]  Stephen Smalley,et al.  The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments , 2000 .

[4]  Ravi S. Sandhu,et al.  The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.

[5]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[6]  Billy Rios,et al.  Hacking: The Next Generation , 2009 .

[7]  Robert W. Shirey,et al.  Internet Security Glossary , 2000, RFC.

[8]  Christopher Krügel,et al.  Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[9]  Kevin Mandia,et al.  Incident Response & Computer Forensics , 2003 .

[10]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[11]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[12]  Christopher Krügel,et al.  A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.

[13]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[14]  Johnny S. Wong,et al.  A taxonomy of intrusion response systems , 2007, Int. J. Inf. Comput. Secur..

[15]  Marco Ramilli,et al.  Multi-stage delivery of malware , 2010, 2010 5th International Conference on Malicious and Unwanted Software.

[16]  Eugene H. Spafford,et al.  The internet worm program: an analysis , 1989, CCRV.

[17]  Anthony Lai,et al.  Evidence of Advanced Persistent Threat: A case study of malware for political espionage , 2011, 2011 6th International Conference on Malicious and Unwanted Software.