Allure Security Technology. (2011, November 9). Final report: Anomaly detection at multiple scales (ADAMS) [DARPA-sponsored research on seeding disinformation in military networks to detect insider threats]. [Read / Analysis]
Android Malware Genome Project. (2012, July 2). Clickjacking rootkits for Android. [Watch].
Ryu, E., & Yoo, K. (2012). Certificateless broadcast authentication for vehicular ad hoc networks. Security and Communication Networks[preprint]. [Abstract / Request]
Schneier, B. (2012, July 2). How to break into security, Schneier edition. [Advice from Bruce Schneier on how to become a computer security professional]. Krebs on Security. [Read]
Sqalli, M. H., Firdous, S. N., Salah, K., & Abu-Amara, M. (2012). Classifying malicious activity in Honeynets using entropy and volume-based thresholds. Security and Communication Networks [preprint]. [Abstract / Request]
United States. Government Accountability Office. (2012, June 29). Critical infrastructure protection: DHS could better manage security surveys and vulnerability assessments. [Read]
Wang, X., Zhang, L., Deokar, A., & Liang, Q. (2012). Enhanced security and reliability with MIMO communications for smart grid. Security and Communication Networks [preprint]. [Abstract / Request]
Zetter, K. (2012, July 5). DNSChanger malware could strand thousands when domains go dark on Monday. Wired. [Read]