DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» PLA Unit 61398
PLA Unit 61398
Getting to Yes with China in Cyberspace
View Final Report (PDF)
Analyzing the Evolution of China's Cyber Espionage Campaigns
Hacks, Leaks and Disruptions | Russian Cyber Strategies
An Analysis of the Nature of Groups Engaged in Cyber Crime
What Is Cyber “Security”?
Attributing Cyber Attacks Thomas Rida & Ben Buchanana a Department of War Studies, King’S College London, UK Published Online: 23 Dec 2014
Cyber Wargaming: Finding, Designing, and Playing Wargames for Cyber Security Education
Digital Warfare Or Organized Crime
U.S.-China Military Contacts: Issues for Congress
Representing Botnet-Enabled Cyber-Attacks and Botnet Takedowns Using Club Theory Olukayode Adegboyega
Sino-Cyber Espionage: an Introduction to the Exploits of Units 61398 and 61486 in the Peopleâ•Žs Liberation Army of China
China's Cyber Warfare Strategy and Approaches Toward Taiwan
Networking Fundamentals
The Rise of China's Hacking Culture: Defining Chinese Hackers
Purple Cyber Security When Red Team and Blue Team Combine
Cybersecurity Threat Landscape
Potential Risks for the Pharmaceutical Sector
Top View
The Most Dangerous Cyber Nightmares in Recent Years Halloween Is the Time of Year for Dressing Up, Watching Scary Movies, and Telling Hair-Raising Tales
Criminal Charges As a Response to Nation-State Malicious Cyber Activity
Understanding the Chinese Communist Party's Approach To
Purple Cyber Security Red Team + Blue Team
ARSTRAT IO Newsletter Online
Organized Crime and the Internet: Implications for National Security
APT1: Exposing One of China's Cyber Espionage Units
Representing Botnet-Enabled Cyber-Attacks and Botnet-Takedowns Using Club Theory
China's Unit 61398 Pulled from the Shadows
ICIT Briefing: the Energy Sector Hacker Report August 24, 2016 Washington D.C
CERIAS Tech Report 2013-9 Crude Faux: an Analysis of Cyber Conflict Within the Oil & Gas Industries by Kambic, K., Aurthor, K
Cyber-Attack Scoring Model Based on the Offensive Cybersecurity Framework
Addressing Hybrid Threats
UC Irvine UC Irvine Electronic Theses and Dissertations
Olympic-Caliber Cybersecurity
2014 6Th International Conference on Cyber Conflict (Cycon 2014)
The Role of Malware in Reported Cyber Espionage: a Review of the Impact and Mechanism
EYE SPY INTELLIGENCE MAGAZINE 118 2018 ○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○ “Soviet Espionage Has Never Stopped
Cyber-Combatants” and Their Prospective Rights Under International Humanitarian Law
Sécurité Informatique
Cyber-Enabled Economic Warfare: an Evolving Challenge
Cyber Attacks: an Unprecedented Threat to U.S
APT1: Exposing One of China's Cyber Espionage Units | Mandiant | Fireeye
The Most Terrifying Incidents Hackers and Organized Groups Diabolic Malware Spookiest Vulnerabilities
Know Your Enemies a Primer on Advanced Persistent Threat Groups
CY 2550 Foundations of Cybersecurity Threat Modeling
Chinese State-Sponsored Cyber Activity November 19, 2020
ICIT Briefing: China's Espionage Dynasty
Attributing Cyber Attacks
China's Development of Cyber Warfare Doctrine
Attribution of Malicious Cyber Incidents 3
Cyber Espionage