Browse by Course code: info6003

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Number of items: 16.
  1. [img]
  2. [img]
    INFO6003 (2013) Towards a formal framework for computation trust -- paper
    the introduction of this research paper (especially pg 2-4) and its list of references may be useful to clarify the notions of Bayesian learning applied to trust as explained in the lectures. This is optional reading

    Shared with the University by
  3. [img]
  4. [img]
    INFO6003 (2013) Week 5
    Anonymity

    Shared with the University by
  5. [img]
    INFO6003 (2013) Week 3
    What is cyber security?

    Shared with the University by
  6. [img]
    INFO6003 (2013) Week 4
    Privacy

    Shared with the University by
  7. [img]
    INFO6003 (2013) Crowds: Anonymity for Web Transactions -- Paper
    This is the original Crowds paper from Reiter and Rubin. Please consider it required reading.

    Shared with the University by
  8. [img]
    INFO6003 (2013) Insider Threat -- Paper
    This is optional reading, for those interested in this very hot topic

    Shared with the University by
  9. [img] [img]
    INFO6003 (2013) Stuxnet and Cyberwarfare -- Papers
    "Is this the start of cyberwarfare" is recommended reading, whilst the longer report "Stuxnet dossier" is optional

    Shared with the University by
  10. [img]
    INFO6003 (2013) Tor: the second generation onion router -- Paper
    This is the original Dingledine et al's Tor paper. Please consider it required reading.

    Shared with the University by
  11. [img] [img]
    INFO6003 (2013) Data Exfiltration -- Papers
    This is a fun paper about data exfiltration. It's suggested reading, I'd like you to try and grasp how difficult the problem is why looking at one 'creative" attack. The second paper is a technical approach, only for the people seriously interested in this topic.

    Shared with the University by
  12. [img] [img]
    INFO6003 (2013) Cyber Kill Chain -- Reports
    These are white papers and reports on Command and Control and Cyber Kill Chain. Consider these readings "almost" required. That is, I'd like you to make a serious effort at reading them.

    Shared with the University by
  13. [img]
    INFO6003 (2013) Cybercrime -- White Paper
    MaAfee White Paper: Cybercrime exposed Required reading

    Shared with the University by
  14. [img]
    INFO6003 (2013) Differential Privacy -- Overview Paper
    Cynthia Dwork: A Firm Foundation for Private Data Analysis Required reading

    Shared with the University by
  15. [img]
    Crowds: Anonymity for Web Transactions
    This is the original Crowds paper from Reiter and Rubin. Please consider it required reading.

    Shared with the University by
  16. [img]
    INFO6003 (2013) Week 3 (preliminary)
    Review of crypto primitives and protocols

    Shared with the University by
This list was generated on Sat Oct 19 12:17:18 2019 UTC.