157 lines
4.9 KiB
BibTeX
157 lines
4.9 KiB
BibTeX
@thesis{BokaThesis,
|
||
title={Expanding the functionality of an e-learning platform to effectively present challenges in the same topic},
|
||
language={hungarian},
|
||
author={Bálint Bokros},
|
||
month=dec,
|
||
year={2017}
|
||
}
|
||
|
||
@online{AkosFacebook,
|
||
title={The three fatal bugs behind the Facebook breach},
|
||
url={https://blog.avatao.com//The-three-fatal-bugs-behind-the-Facebook-breach/},
|
||
journal={Avatao blog},
|
||
author={Ákos Hajba},
|
||
language={english},
|
||
month=oct,
|
||
year={2018}
|
||
}
|
||
|
||
@online{FacebookBreach,
|
||
title={Facebook Security Update},
|
||
url={https://newsroom.fb.com/news/2018/09/security-update/},
|
||
journal={Facebook newsroom},
|
||
author={Guy Rosen},
|
||
language={english},
|
||
month=sep,
|
||
year={2018}
|
||
}
|
||
|
||
@online{ChinaSurv,
|
||
title={Inside China’s Dystopian Dreams: AI, Shame and Lots of Cameras},
|
||
url={https://www.nytimes.com/2018/07/08/business/china-surveillance-technology.html},
|
||
journal={The New York Times},
|
||
language={english},
|
||
author={Paul Mozur},
|
||
month=jul,
|
||
year={2018}
|
||
}
|
||
|
||
@online{ChinaCredit,
|
||
title={China has started ranking citizens with a creepy 'social credit' system},
|
||
url={https://www.businessinsider.com/china-social-credit-system-punishments-and-rewards-explained-2018-4},
|
||
journal={Business Insider},
|
||
language={english},
|
||
author={Alexandra Ma},
|
||
month=oct,
|
||
year={2018},
|
||
}
|
||
|
||
@online{SelfDriving,
|
||
title={Hackers Are the Real Obstacle for Self-Driving Vehicles},
|
||
url={https://www.technologyreview.com/s/608618/hackers-are-the-real-obstacle-for-self-driving-vehicles/},
|
||
journal={MIT Technology Review},
|
||
language={english},
|
||
author={Simson Garfinkel},
|
||
month=aug,
|
||
year={2017},
|
||
}
|
||
|
||
@online{Android,
|
||
title={Android 'API breaking' vulnerability leaks device data, allows user tracking},
|
||
url={https://www.zdnet.com/article/android-operating-system-vulnerability-leaks-device-data-allows-user-tracking/},
|
||
journal={ZDNet},
|
||
language={english},
|
||
author={Charlie Osborne},
|
||
month=aug,
|
||
year={2018},
|
||
}
|
||
|
||
@online{IoTDDoS,
|
||
title={Massive Dyn DDOS Attack: Experts Blame Smart Fridges, DVRs And Other IoT Devices Why Your Internet Went Down},
|
||
url={https://www.techtimes.com/articles/183339/20161024/massive-dyn-ddos-attack-experts-blame-smart-fridges-dvrs-and-other-iot-devices-why-your-internet-went-down.htm},
|
||
journal={Tech Times},
|
||
language={english},
|
||
author={Horia Ungureanu},
|
||
month=oct,
|
||
year={2016},
|
||
}
|
||
|
||
@online{ITSecEdu,
|
||
title={Education as a key factor in the process of building cybersecurity},
|
||
url={https://2017.cybersecforum.eu/files/2016/12/ecj_vol2_issue1_i.albrycht_education_as_a_key_in_the_process_of_building_cybersecurity.pdf},
|
||
language={english},
|
||
author={Izabela Albrycht},
|
||
year={2016},
|
||
}
|
||
|
||
@online{EBayGit,
|
||
title={Pwning eBay - How I Dumped eBay Japan's Website Source Code},
|
||
url={https://slashcrypto.org/2018/11/28/eBay-source-code-leak/},
|
||
language={english},
|
||
author={David Wind},
|
||
year={2018},
|
||
month=nov,
|
||
}
|
||
|
||
@online{CloudFlareLeak,
|
||
title={Incident report on memory leak caused by Cloudflare parser bug},
|
||
url={https://blog.cloudflare.com/incident-report-on-memory-leak-caused-by-cloudflare-parser-bug/},
|
||
language={english},
|
||
author={John Graham-Cumming},
|
||
year={2017},
|
||
month=feb,
|
||
}
|
||
|
||
@online{NoPerfectSecurity,
|
||
title={The Illusion Of Perfect Cybersecurity},
|
||
url={https://www.forbes.com/sites/forbestechcouncil/2018/03/27/the-illusion-of-perfect-cybersecurity/},
|
||
language={english},
|
||
author={George Finney},
|
||
year={2018},
|
||
month=mar,
|
||
}
|
||
|
||
@online{JavaScript,
|
||
title={JavaScript is a Dysfunctional Programming Language},
|
||
url={https://medium.com/javascript-non-grata/javascript-is-a-dysfunctional-programming-language-a1f4866e186f},
|
||
language={english},
|
||
author={Richard Kenneth Eng},
|
||
year={2016},
|
||
month=mar,
|
||
}
|
||
|
||
@online{NodeModules,
|
||
title={What’s really wrong with node\_modules and why this is your fault},
|
||
url={https://hackernoon.com/whats-really-wrong-with-node-modules-and-why-this-is-your-fault-8ac9fa893823},
|
||
language={english},
|
||
author={Mateusz Morszczyzna},
|
||
year={2017},
|
||
month=dec,
|
||
}
|
||
|
||
@online{SemancatVersioning,
|
||
title={Semancat versioning},
|
||
url={https://blog.avatao.com/semancat-versioning/},
|
||
language={english},
|
||
author={Kristóf Tóth},
|
||
year={2018},
|
||
month=sep,
|
||
}
|
||
|
||
@online{CyberArmsRace,
|
||
title={Inside the secret digital arms race: Facing the threat of a global cyberwar},
|
||
url={https://www.techrepublic.com/article/inside-the-secret-digital-arms-race/},
|
||
language={english},
|
||
author={Steve Ranger},
|
||
year={2014},
|
||
}
|
||
|
||
@online{MarriottBreach,
|
||
title={Marriott breach leaves 500 million exposed with passport, card numbers stolen},
|
||
url={https://arstechnica.com/information-technology/2018/11/marriott-breach-leaves-500-million-exposed-with-passport-card-numbers-stolen/},
|
||
language={english},
|
||
author={Megan Geuss},
|
||
year={2018},
|
||
month=nov,
|
||
}
|