January 25, 2013

  • arXiv [preprints – full text]:
  • Campbell, J. (2013, Jan. 24). LAPD Spied on 21 Using StingRay Anti-Terrorism Tool. LA Weekly. [Read]
  • Gallagher, R. (2013, Jan. 24). Letter to Skype: Come Clean on Your Eavesdropping Capabilities and Policies. Slate. [Read]
  • [Gartner – full text / link to database + search for title in box at upper right]]:
    • Creating a Security Process Catalog
    • Formalizing Security Processes
    • Security Governance, Management and Operations Are Not the Same
    • The Security Processes You Must Get Right
  • Google. (2013, Jan. 23). Transparency Report: What it Takes for Governments to Access Personal Information. [Read]
  • McMillan, R. (2013, Jan. 18). Google Declares War on the Password. Wired. [Read]
  • Rao, A., Jha, B., & Kini, G. (2013). Effect of Grammar on Security of Long Passwords [preprint]. [Read – download via Carnegie Mellon]
  • Security & Communication Networks – new issue [full text]:
  • Sood, A. K., & Enbody, R. J. (2013). Crimeware-as-a-service – A Survey of Commoditized Crimeware in the Underground Market [preprint]. International Journal of Critical Infrastructure Protection. [Read]

Calls for Papers


  • Held in conjunction with the the 8th ACM Symposium on Information, Computer and Communications Security [all May 7, 2013, with submissions due Feb. 1]:

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: