<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Brent Maheux</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Assessing the Intentions and Timing of Malware</style></title><secondary-title><style face="normal" font="default" size="100%">Technology Innovation Management Review</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">malware</style></keyword><keyword><style  face="normal" font="default" size="100%">optimal timing</style></keyword><keyword><style  face="normal" font="default" size="100%">persistence</style></keyword><keyword><style  face="normal" font="default" size="100%">stealth</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">11/2014</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://timreview.ca/article/848</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Talent First Network</style></publisher><pub-location><style face="normal" font="default" size="100%">Ottawa</style></pub-location><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">34-40</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Malware has become a significant, complex, and widespread problem within the computer industry. It represents one of the most prevalent threats to cybersecurity and is increasingly able to circumvent current detection and mitigation techniques. To help better understand when a malware attack might happen, this article proposes an intention-based classification of malware and merges it with an optimal timing model to help predict the timing of malware based on its classification. The classification model is based on an examination of eight malware samples, and it identifies four malware classifications and commonalities based on the dimensions of persistence and stealth. The goal of the article is to provide a better understanding of when cyber-conflict will happen, and to help defenders better mitigate the potential damage.</style></abstract><issue><style face="normal" font="default" size="100%">11</style></issue><custom1><style face="normal" font="default" size="100%">Carleton University
Brent Maheux is a Senior Software Specialist for the Canadian Government. He holds an MEng degree in Technology Innovation Management from Carleton University in Ottawa, Canada, and a BCS degree in Computer Science from Dalhousie University in Halifax, Canada. He has over 7 years working experience within the public and private sector specializing in product design and implementation.</style></custom1></record></records></xml>