Références bibliographiques
- Ghernaouti-Hélie, S. (2011). Menaces, conflits dans le cyberespace et cyberpouvoir. Sécurité et stratégie, 7(3), 61-67.
- Ghernaouti-Hélie, S. (2013). Sécurité informatique et réseaux : cours avec plus de 100 exercices corrigés (4e édition.). Paris: Dunod.
- Gregg, Michael. (2015). The network security test lab : a step-by-step guide. Indianapolis, IN : John Wiley & Sons.
- Wang, J., & Kissel, Z. A. (2015). Introduction to network security : theory and practice (Second edition.). Hoboken, NJ : Singapore: Wiley , HEP
Liste de lectures pour le projet
- Access-rule certificates for secure distributed healthcare applications over the Internet I. Mavridis, C. Georgiadis and G. Pangalos
- Armstrong, M. E., Jones, K. S., Namin, A. S., & Newton, D. C. (2018). The Knowledge, Skills, and Abilities Used by Penetration Testers: Results of Interviews with Cybersecurity Professionals in Vulnerability Assessment and Management. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 62(1), 709–713.
- Bergren, M. D. (2001). The Facts About E-mail. The Journal of School Nursing, 17(5), 274–277.
- Chang, J.-S., Jeon, Y.-H., Sim, S., & Kang, A. N. (2015). Information Security Modeling for the Operation of a Novel Highly Trusted Network in a Virtualization Environment. International Journal of Distributed Sensor Networks.
- Goldman, K. D., & Schmalz, K. J. (2006). “CSI: Mylaptop”: Computer Security Issues: How Vulnerable Am I? Health Promotion Practice, 7(3), 276–279.
- Huang, J.-Y., Hong, W.-C., Tsai, P.-S., & Liao, I.-E. (2017). A model for aggregation and filtering on encrypted XML streams in fog computing. International Journal of Distributed Sensor Networks.
- Lee Epling, Brandon Hinkel, and Yi Hu. 2015. Penetration testing in a box. In Proceedings of the 2015 Information Security Curriculum Development Conference (InfoSec '15). ACM, New York, NY, USA, Article 6, 4 pages.
- Li, W., Vaughn, R. B., & Dandass, Y. S. (2006). An Approach to Model Network Exploitations Using Exploitation Graphs. SIMULATION, 82(8), 523–541.
- Min-Woo Park, Young-Hyun Choi, Jung-Ho Eom, and Tai-Myoung Chung. 2014. Dangerous Wi-Fi access point: attacks to benign smartphone applications. Personal Ubiquitous Comput. 18, 6 (August 2014), 1373-1386.
- Richard D. Austin. 2007. Digital forensics on the cheap: teaching forensics using open source tools. In Proceedings of the 4th annual conference on Information security curriculum development (InfoSecCD '07). ACM, New York, NY, USA, Article 6, 5 pages.
- Routa Moussaileb, Benjamin Bouget, Aurélien Palisse, Hélène Le Bouder, Nora Cuppens, and Jean-Louis Lanet. 2018. Ransomware's Early Mitigation Mechanisms. In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). ACM, New York, NY, USA, Article 2, 10 pages.
- Takashi Yamanoue. 2017. Monitoring Servers, With a Little Help from my Bots. In Proceedings of the 2017 ACM Annual Conference on SIGUCCS (SIGUCCS '17). ACM, New York, NY, USA, 173-180. DOI: https://doi-org.tlqprox.teluq.uquebec.ca/10.1145/3123458.3123461
- Zouheir Trabelsi. 2011. Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning. In Proceedings of the 2011 Information Security Curriculum Development Conference (InfoSecCD '11). ACM, New York, NY, USA, 74-83.