Browse by Course code: info6003

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Number of items: 16.
  1. [img]
    INFO6003: Bitcoin: A technical introduction (2013)
    Shared with the University by
    Prof vladi Sassone
  2. [img]
    INFO6003 (2013) Towards a formal framework for computation trust -- paper
    the introduction of this research paper (especially pg 2-4) and its list of references may be useful to clarify the notions of Bayesian learning applied to trust as explained in the lectures. This is optional reading

    Shared with the University by
    Prof vladi Sassone
  3. [img]
    INFO6003 (2013) Database and Data Mining Security
    Shared with the University by
    Prof vladi Sassone
  4. [img]
    INFO6003 (2013) Week 5
    Anonymity

    Shared with the University by
    Prof vladi Sassone
  5. [img]
    INFO6003 (2013) Week 3
    What is cyber security?

    Shared with the University by
    Prof vladi Sassone
  6. [img]
    INFO6003 (2013) Week 4
    Privacy

    Shared with the University by
    Prof vladi Sassone
  7. [img]
    INFO6003 (2013) Crowds: Anonymity for Web Transactions -- Paper
    This is the original Crowds paper from Reiter and Rubin. Please consider it required reading.

    Shared with the University by
    Prof vladi Sassone
  8. [img]
    INFO6003 (2013) Insider Threat -- Paper
    This is optional reading, for those interested in this very hot topic

    Shared with the University by
    Prof vladi Sassone
  9. [img] [img]
    INFO6003 (2013) Stuxnet and Cyberwarfare -- Papers
    "Is this the start of cyberwarfare" is recommended reading, whilst the longer report "Stuxnet dossier" is optional

    Shared with the University by
    Prof vladi Sassone
  10. [img]
    INFO6003 (2013) Tor: the second generation onion router -- Paper
    This is the original Dingledine et al's Tor paper. Please consider it required reading.

    Shared with the University by
    Prof vladi Sassone
  11. [img] [img]
    INFO6003 (2013) Data Exfiltration -- Papers
    This is a fun paper about data exfiltration. It's suggested reading, I'd like you to try and grasp how difficult the problem is why looking at one 'creative" attack. The second paper is a technical approach, only for the people seriously interested in this topic.

    Shared with the University by
    Prof vladi Sassone
  12. [img] [img]
    INFO6003 (2013) Cyber Kill Chain -- Reports
    These are white papers and reports on Command and Control and Cyber Kill Chain. Consider these readings "almost" required. That is, I'd like you to make a serious effort at reading them.

    Shared with the University by
    Prof vladi Sassone
  13. [img]
    INFO6003 (2013) Cybercrime -- White Paper
    MaAfee White Paper: Cybercrime exposed Required reading

    Shared with the University by
    Prof vladi Sassone
  14. [img]
    INFO6003 (2013) Differential Privacy -- Overview Paper
    Cynthia Dwork: A Firm Foundation for Private Data Analysis Required reading

    Shared with the University by
    Prof vladi Sassone
  15. [img]
    Crowds: Anonymity for Web Transactions
    This is the original Crowds paper from Reiter and Rubin. Please consider it required reading.

    Shared with the University by
    Prof vladi Sassone
  16. [img]
    INFO6003 (2013) Week 3 (preliminary)
    Review of crypto primitives and protocols

    Shared with the University by
    Prof vladi Sassone
This list was generated on Sun Dec 22 02:14:52 2024 UTC.