GhostNet: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 5: | Line 5: | ||
==Recommended Literature== | ==Recommended Literature== | ||
* [http://en.wikipedia.org/wiki/GhostNet Wikipedia entry] | * [http://en.wikipedia.org/wiki/GhostNet Wikipedia entry] | ||
* Shishir Nagaraja & Ross Anderson, [http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf The snooping dragon: social-malware surveillance of the Tibetan movement], University of Cambridge Computer Laboratory Technical Report, March 2009 | |||
[[Category:Case Studies]] | [[Category:Case Studies]] |
Revision as of 13:03, 9 August 2012
This page is currently under construction. Check back for updates soon. |
Case Summary
Recommended Literature
- Wikipedia entry
- Shishir Nagaraja & Ross Anderson, The snooping dragon: social-malware surveillance of the Tibetan movement, University of Cambridge Computer Laboratory Technical Report, March 2009