Skip to main content

Home/ CSIA 459/ Contents contributed and discussions participated by Trevor Pyle

Contents contributed and discussions participated by Trevor Pyle

1More

Big Data, Trying to Build Better Workers - 2 views

  •  
    Interesting article from the NY Times on how some companies are utilizing big data in the work environment.
1More

Local police grapple with abilities to respond to cybercrimes and cyberthreats - 2 views

  •  
    Article from the Washington Post about law enforcement's struggle to respond to "smaller" cybercrimes.
1More

Google Fiber Coming To Austin, TX? - 0 views

  •  
    Just a heads up for anyone living in Austin, TX.
1More

The limits of privacy in automated profiling and data mining - 0 views

  •  
    Source for my annotated bibliography.
1More

Big Data: Issues and Challenges Moving Forward - 0 views

  •  
    Source for my annotated bibliography.
1More

Web Analytics for Security Informatics - 0 views

shared by Trevor Pyle on 01 Apr 13 - No Cached
  •  
    Source for my annotated bibliography.
1More

Risk-Based Systems Security Engineering: Stopping Attacks with Intention - 0 views

  •  
    Source for my annotated bibliography.
1More

Security Analytics and Measurements - 0 views

  •  
    Source for my annotated bibliography. I focused on the Cyber Adversaries and Game Theory article.
1More

Cyber War Over Spam Slows Access for Internet Users | PBS NewsHour | March 27, 2013 - 2 views

  •  
    PBS Newshour video on the clash between Spamhaus and Cyberbunker.
1More

Logic Bomb Set Off South Korea Cyberattack - 1 views

  •  
    The recent cyberattack against South Korean media organizations and financial institutions was initiated by a logic bomb.
1More

Apple's Password-Reset Security Breach - 1 views

  •  
    Apple has fully implemented multifactor authentication, but not without some security issues for their users. Since Apple has fixed the flaws, the article covers the steps in the vulnerability.
1 - 11 of 11
Showing 20 items per page