Skip to main content

Home/ Groups/ CSIA 459
Trevor Pyle

The limits of privacy in automated profiling and data mining - 0 views

  •  
    Source for my annotated bibliography.
Trevor Pyle

Big Data: Issues and Challenges Moving Forward - 0 views

  •  
    Source for my annotated bibliography.
Trevor Pyle

Web Analytics for Security Informatics - 0 views

shared by Trevor Pyle on 01 Apr 13 - No Cached
  •  
    Source for my annotated bibliography.
Trevor Pyle

Risk-Based Systems Security Engineering: Stopping Attacks with Intention - 0 views

  •  
    Source for my annotated bibliography.
Trevor Pyle

Security Analytics and Measurements - 0 views

  •  
    Source for my annotated bibliography. I focused on the Cyber Adversaries and Game Theory article.
Vickye F

Manageing Smart Phones Security Risks - 1 views

  •  
    annotated bibliography
Vickye F

Cell Phones and Cancer Risks - 1 views

  •  
    annotated Bibliography
Vickye F

Declaratively programming the mobile web with Mobl - 1 views

  •  
    annotated bibliography
Vickye F

The Really Smart Phone - 0 views

  •  
    annotated bibliography
Phil Kemp

Our Internet Surveillance State - 1 views

  •  
    The article was written by Bruce and published on CNN this month. It discusses the fact that almost everything we do can be and is monitored by someone, and eventually is subject to Government purvue. He shows how several key people who have been found their way into law enforcement pathways have taken many precautions, but all eventually were caught by other means which were correlated together to form the big picture.
  •  
    Phil, I have to say after reading this I am glad I still have a flip phone with no smart technology on it. I have read were your smart phones embed the lat/long into pictures if that function is turned on and that data can be retrieved from facebook if you have the right software. It just goes to show that what we see on TV has an impact on what we have in real life. Lee
Leo T Garcia

Near Field Communications Primer - 1 views

  •  
    Here is a primer on Near Field Communications (NFC) which is a set of standards for smartphones that establishes radio communication between similar devices which are in close proximity. It is a subset for RFID (radio-frequency identification) and is being integrated into our daily lives as in most technology. The low-cost NFC tags practical uses are limited only by imagination, the challenge will be is to mitigate the cybersecurity risks it poses.
  •  
    Here is another video presentation on NFC. http://www.youtube.com/watch?v=_RBbuGwC7Eg
  •  
    I have to say this was a very interesting video to watch, and I see now how these things work and what we can do with them. I do like the fact that they have a shorter range than Bluetooth as well as less power consumption. I would still be worried about losing information when say on a crowded train or bus. People could brush up against your phone and you may not realize it. thanks for sharing. Lee
Jeremy Croghan

ScienceDirect.com - Procedia Engineering - A Survey on Futuristic Health Care System: W... - 0 views

  •  
    "With the increasing use of wireless networks and miniaturization of electronic Devices has allowed the realization of Wireless Body Area Networks (WBANs). It is one of the latest technologies in health care diagnosis and management. WBAN consists of various intelligent bio sensors attached on or implanted in the body like under the skin. "
glenn_g

Cyberstroke - 1 views

  •  
    Describese the efforts to create cyberweapons and some good descriptions of some that are in development
Jeremy Croghan

ScienceDirect.com - Procedia Engineering - Wireless Sensor Network with Temperature Com... - 0 views

  •  
    "System consists of identically designed sensor modules which are self-sustaining, wireless, act as transmitters and receivers and are equipped with a special sensor technology for long-term monitoring of buildings or engineering facilities. The sensor unit uses strain gauges for stress analysis and contains interfaces for additional sensors. The system in particular applies to buildings and structures for transport and traffic and large-scale industrial facilities, where a subsequent wiring installation is difficult or impossible."
glenn_g

Surge of Cybersecurity Beuracracies Sparks Lucrative Opertunities - 1 views

  •  
    How we can make buckets of money due to the changing cybersecurity environment and the tools we will have to develop and be proficient with. Good stuff about the DHS in cybersecurity here
glenn_g

First Strike - 0 views

  •  
    The US shift from defense to offense and the development of 'cyberweapons'
Jeremy Croghan

ScienceDirect.com - Procedia Engineering - A Rule Based Approach for Attribute Selectio... - 0 views

  •  
    "A new rule based attribute selection algorithm for removing the redundant attributes which are used in decision making on intrusions in wireless sensor networks. This work focuses mainly on finding important attributes to find Denial of Service attacks. "
glenn_g

Cloud computing in Cyberwarfare - 0 views

  •  
    If you want to know about cloud computing or the Flame virus, you need to read this article
Jeremy Croghan

ScienceDirect.com - Procedia Engineering - A Review of Physical Attacks and Trusted Pla... - 0 views

  •  
    "The design of sensors that are small, low cost, low power and combined with its ability to be left unattended has made it more viable and indirectly promotes its popularity for future solutions in various real-life challenges. However, in sensor network, the nodes are physically accessible by adversaries and have been known to expose cryptographic materials such as the encryption keys and other important data in the sensor nodes"
glenn_g

Terrorists use smartphone technology to create invisible networks - 1 views

  •  
    Part of my cyberwarfare paper
« First ‹ Previous 221 - 240 of 332 Next › Last »
Showing 20 items per page