Skip Navigation

Home Projects Publications Archives About Sign Up or Log In

Browse Resources

Computer security -- Research

Resources
View Resource Usability and privacy: a study of Kazaa P2P file-sharing

Published on the Hewlett Packard (HP) Web site, this report finds that a large percentage of Kazaa users have either accidentally or unknowingly shared their private files with everyone who has access to the Kazaa network. Conducted by Nathaniel S. Good of HP Labs and Aaron Krekelberg of the University of Minnesota, this study discloses shortcomings in the Kazaa software, which in turn, poses a...

http://www.hpl.hp.com/techreports/2002/HPL-2002-163.html?jum...
View Resource The Information Warfare Site (IWS)

Based in the UK, IWS is "an online resource that aims to stimulate debate about a range of subjects from information security to information operations and e-commerce," with an emphasis on offensive and defensive information operations. To these ends, it offers a number of resources, including selected documents, articles, and online journals that relate to twelve topics, such as computer...

http://www.iwar.org.uk/
View Resource Anti-Terrorism Technology

The September 11 terrorist attacks have spurred intense research efforts to develop new and better technologies that can be used in the War on Terror. Whether these innovations are designed to combat immediate threats or prevent future disasters, they will undoubtedly save lives. The Bridge (1) is a quarterly publication of the National Academy of Engineering. The latest issue is comprised of...

https://scout.wisc.edu/report/nsdl/met/2002/0607
View Resource TCPA: Trusted Computing Platform Alliance

The Trusted Computing Platform Alliance (TCPA) is one of the most high-profile operations for the development and adoption of an industry standard for personal computer security. The main participants in the TCPA are Compaq, HP, IBM, Intel, and Microsoft. This Web site has many documents written for or about the alliance. The most significant resource is the latest version of the main...

https://mako.cc/talks/20030416-politics_and_tech_of_control/...
View Resource Computer Immune Systems

A research group at the University of New Mexico Computer Science Department is using an analogy to biological immune systems to develop similarly functioning computer security systems. This is a significant departure from existing methods. Computer immune systems are designed to detect and contain intrusions in the same way their biological counterparts deal with viruses and infections. The...

http://www.cs.unm.edu/~immsec/
View Resource Vmyths.com: Truth about Computer Security Hysteria

Citing common misconceptions and the deliberate distribution of misinformation about computer security, the Vmyths Web site serves as a reference to refute virus hoaxes and, more generally, to eliminate widespread hysteria by educating the unaware. False email warnings can cause the recipient to delete important system files, thinking they are infected with a virus. This is just one situation that...

http://vmyths.com/
View Resource BlackHat Media Archives

This massive archive of presentations is offered for "the world wide computer security community." The archive can be accessed at no cost, and mainly consists of slide presentations from BlackHat conferences and conventions. These events began in 1997 to help professionals assess potential risks and recognize areas most vulnerable to security breaches. The material available in the archive...

http://www.blackhat.com/html/archives.html
View Resource Computer Security Resource Center (CSRC): History of Computer Security

This Web site serves as a collection of seminal research papers that "every serious student of computer security should read." Mostly from the 1970's but also stretching into the '80s, the papers were first collectively distributed at the 1998 National Information Systems Security Conference but are now offered online to make them more widely available. Each paper contributed to computer security...

https://csrc.nist.gov/publications/history/
View Resource Pew Research Center: Americans and Cybersecurity Screenshot

How concerned is the average American about a cyberattack? How many Americans have personally experienced breaches of cybersecurity? Do Americans trust the federal government to protect them from cyberattacks? Do they trust social network sites, such as Facebook and Twitter, to protect their cybersecurity? In January 2017, the Pew Research Center released a 43-page report investigating American...

http://www.pewinternet.org/2017/01/26/americans-and-cybersec...