Skip to main content

Home/ Groups/ CSIA 459
glenn_g

Terrorists use smartphone technology to create invisible networks - 1 views

  •  
    Part of my cyberwarfare paper
Ben Garey

US Army Deploys 3D Printing Labs to Battlefield - 1 views

  •  
    Here is more on 3D printing and the ways the army is using it.
Ben Garey

3D printing - 0 views

  •  
    Here is something from Fox News about 3D printing and the benefits to the army.
Ben Garey

3D printing - 1 views

shared by Ben Garey on 31 Mar 13 - Cached
  •  
    Here is something to look at about 3D printing.
Michael Austin

Near Field Communication: How will it change airport processing and the passenger exper... - 0 views

  •  
    A brief article on the prospects of NFC with regards to Airport Management.
Michael Austin

Security in Near Field Communication (NFC): Strengths and Weaknesses - 0 views

  •  
    A detailed analysis of the functioning of NFC and the vulnerabilities associated with it.
  •  
    Michael, I like the way the paper talked about the strengths and weaknesses of NCF and how to work with them. Ben
Michael Austin

Strengths and Weaknesses of Near Field Communication (NFC) Technology - 0 views

  •  
    A paper discussing how NFC technology works, what it's vulnerabilities are, and how to counteract them.
Michael Austin

NFC Phones Raise Opportunities, Privacy And Security Issues - 1 views

  •  
    An article detailing the privacy concerns regarding mass implementation of NFC technology in mobile devices.
  • ...1 more comment...
  •  
    Michael, privacy is just going to become more and more of an issue as time goes on. Good post. Ben
  •  
    Michael & Ben, Did you know that iPhone 5 passed on Near-Field Communication Data Sharing while Samsung, Nokia and HTC didn't ? Article: Android Embraces, iPhone 5 Passes on Near-Field Communication Data Sharing http://www.scientificamerican.com/article.cfm?id=near-field-communication-security-purchase Sam Rios
  •  
    Hi Sam, I had noticed that the iPhone 5 wasn't using NFC. I didn't research it further though, as I honestly don't care for Apple products (way overpriced imho). There are numerous reasons Apple may not want to use NFC, which could be anything from them having a competing technology and not wanting it to prosper to them simply not seeing the value the technology in its current implementation (it is still in its infancy in some respects). I found a site which was able to list numerous reasons NFC is lagging behind: http://news.cnet.com/8301-1035_3-57441842-94/is-nfc-killing-google-wallet/ ~Mike
Michael Austin

A Comprehensive Study of Google Wallet as an NFC Application - 0 views

  •  
    As the title suggests, this is a detailed paper on the implementation and security concerns associated with Google Wallet and NFC.
Jeremy Croghan

ScienceDirect.com - Procedia Engineering - A Review of Physical Attacks and Trusted Pla... - 0 views

  •  
    "The design of sensors that are small, low cost, low power and combined with its ability to be left unattended has made it more viable and indirectly promotes its popularity for future solutions in various real-life challenges. However, in sensor network, the nodes are physically accessible by adversaries and have been known to expose cryptographic materials such as the encryption keys and other important data in the sensor nodes"
glenn_g

Cloud computing in Cyberwarfare - 0 views

  •  
    If you want to know about cloud computing or the Flame virus, you need to read this article
Vickye F

Cell Phones and Cancer Risks - 1 views

  •  
    annotated Bibliography
Vickye F

Manageing Smart Phones Security Risks - 1 views

  •  
    annotated bibliography
Trevor Pyle

Security Analytics and Measurements - 0 views

  •  
    Source for my annotated bibliography. I focused on the Cyber Adversaries and Game Theory article.
Trevor Pyle

Risk-Based Systems Security Engineering: Stopping Attacks with Intention - 0 views

  •  
    Source for my annotated bibliography.
Trevor Pyle

Web Analytics for Security Informatics - 0 views

shared by Trevor Pyle on 01 Apr 13 - No Cached
  •  
    Source for my annotated bibliography.
Trevor Pyle

Big Data: Issues and Challenges Moving Forward - 0 views

  •  
    Source for my annotated bibliography.
« First ‹ Previous 301 - 320 Next ›
Showing 20 items per page