Archive

Monthly Archives: February 2013

  • arXiv [preprints – full text]:
  • Digital Investigation [full text]:
  • Journal of Network and Computer Applications [full text]:
  • Journal of Systems & Software [full text]:
  • Security & Communication Networks – new issue [Abstracts / Request]:

Events

Calls for Papers

Conferences

Creative Commons License
Cybersecurity Update by UMUC / ILS is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Advertisements
  • arXiv [preprints – full text]:
  • Chow, S. S. M., Au, H. M., & Susilo, W. (2013). Server-aided Signatures Verification Secure Against Collusion Attack. Information Security Technical Report. [Read]
  • Computer Law & Security Review – selected articles [full text]:
  • Computer Networks – preprints [full text]:
  • Computers & Security – articles [full text]:
  • Electronic Privacy Information Center. (2013, Feb. 12). EPIC Obtains New Documents About FBI Cellphone Tracking Technology [~300 pgs. RE: warrantless surveillance]. [Read]
  • European Network and Information Security Agency. (2013, Feb. 14). Critical Cloud Computing: A CIIP Perspective on Cloud Computing Services. [Read]
  • Future Generation Computer Systems – selected articles [full text]:
  • Gallagher, R. (2013, Feb. 10). Software that Tracks People on Social Media Created by Defence Firm [RE: Raytheon Riot]. Guardian. [Read]
  • Gjelten, T. (2013, Feb. 12). In Cyberwar, Software Flaws Are A Hot Commodity. National Public Radio. [Listen]
  • IEEE Transactions on Information Forensics & Security – selected articles [Abstracts / Request]:
  • Journal of Network and Computer Applications –  selected articles [full text]:
  • Kravets, D. (2013, Feb. 8). DHS Watchdog OKs ‘Suspicionless’ Seizure of Electronic Devices Along Border. Wired. [Read]
  • Krebs, B. (2013, Feb. 13). Exploit Sat on LA Times Website for 6 Weeks. Krebs on Security. [Read]
  • Lawrence, D., & Riley, M. (2013, Feb. 14). A Chinese Hacker’s Identity Unmasked. Bloomberg. [Read]
  • Li, Y. et al. (2013, Feb.). Horus: Fine-Grained Encryption-Based Security for Large-Scale Storage. Paper presented at 11th USENIX Conference on File and Storage Technologies. [Read]
  • Marturana, F., & Tacconi, S. (2013). A Machine Learning-based Triage Methodology for Automated Categorization of Digital Media. Digital Investigation. [Read]
  • Müller, T.,  & Spreitzenbarth, M. (2013, Feb.). FROST: Forensic Recovery Of Scrambled Telephones [Friedrich-Alexander-Universiät Erlangen-Nürnberg]. [Read]
  • Nakashima, E. (2013, Feb. 10). U.S. Said to be Target of Massive Cyber-espionage Campaign. Washington Post. [Read]
  • RSA Conference 2013 – podcasts:
  • Trustworthy Internet Movement. (2013, Feb. 14). SSL Pulse: Survey of the SSL Implementation of the Most Popular Web Sites. [Read]
  • United States. Department of Energy. (2013, Feb. 11). DOE Issues Funding Opportunity for Innovations to Increase Cybersecurity for Energy Delivery Systems [“~$20 million is expected to be available for awards”]. [Read]
  • United States. Executive Office of the President. (2013, Feb. 13). Presidential Policy Directive — Critical Infrastructure Security and Resilience. [Read]
  • United States. Government Accountability Office. (2013, Feb. 14). National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented. [Read]

Calls for Papers

Conferences

Journals

Creative Commons License
Cybersecurity Update by UMUC / ILS is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

  • AlFardan, N. J., & Paterson, K. G. (2013, Feb. 6). Lucky Thirteen: Breaking the TLS and DTLS Record Protocols [preprint]. [Read]
  • Alomair, B., Clark, A., Cuellar, J., & Poovendran, R. (2013). Toward a Statistical Framework for Source Anonymity in Sensor Networks. IEEE Transactions on Mobile Computing. [Read]
  • arXiv [preprints – full text]:
  • Computers & Security – new issue + preprints [full text]:
  • Higgins, K. J. (2013, Feb. 6). Researchers Demo Building Control Systems Hack. Security Dark Reading. [Read]
  • IEEE Communications Magazine – selected new articles [Abstracts / Request]:
  • IEEE Security & Privacy – new issue [full text]:
  • IEEE Transactions on Wireless Communications – selected new articles [Abstracts / Request]:
  • Inkster, N. (2013). Chinese Intelligence in the Cyber Age. Survival: Global Politics & Strategy. [Read]
  • IT Professional – selected new articles / preprints [full text]:
  • Journal of Computer Virology and Hacking Techniques – preprints [Abstracts / Request]:
  • Kleiner, A., Nicholas, P., & Sullivan K. (2013, Feb.). Linking Cybersecurity Policy and Performance [Microsoft Research]. [Read – PDF download from Microsoft / Summary]
  • Kravets, D. (2013, Feb. 7). Secret Surveillance Court Gets New Presiding Judge. Wired. [Read]
  • Krebs, B. (2013, Feb. 7). Microsoft, Symantec Hijack ‘Bamital’ Botnet. Krebs on Security. [Read]
  • Silver, V. (2013, Feb. 4). Rights Groups File OECD Complaint Against Surveillance Firms. Bloomberg. [Read]
  • Symantec / Ponemon Institute / (2013, Feb.). What’s Yours is Mine: How Employees are Putting Your Intellectual Property at Risk. [Read]
  • Timberg, C. (2013, Feb. 6). ‘Fragmentation’ Leaves Android Phones Vulnerable to Hackers, Scammers. Washington Post. [Read]
  • United States. Federal Trade Commission. (2013, Feb.). Mobile Privacy Disclosures: Building Trust Through Transparency. [Read / Summary]
  • United States. Government Accountability Office. (2013, Jan. 25 – newly released). Federal Communications Commission Needs to Strengthen Controls over Enhanced Secured Network Project. [Read]
  • United States. National Institute of Standards and Technology. (2013, Feb.). Security and Privacy Controls for Federal Information Systems and Organizations [Special Publication 800-53]. [Read]

Events

Creative Commons License
Cybersecurity Update by UMUC / ILS is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

[PLEASE NOTE: Gartner will not be available after 2/1/13]

    • arXiv [preprints – full text]:
    • Brumfield, B. (2013, Jan. 27). Anonymous Threatens Justice Department Over Hacktivist Death. CNN. [Read]
    • Cisco. (2013, Jan.). 2013 Cisco Annual Security Report. [Read / Summary]
    • Goodin, D. (2013, Jan. 28). Java’s New “Very High” Security Mode Can’t Protect You from Malware. Ars Technica. [Read / Also: Firefox and Apple Blacklist Java]
    • Greenwald, G. (2013, Jan. 28). Pentagon’s New Massive Expansion of ‘Cyber-security’ Unit is About Everything Except Defense. Guardian. [Read]
    • Hutcheon, S. (2013, Jan. 30). Government Internet Snooping Takes More Than It Gives, Says Web Founder. Sydney Morning Herald. [Read]
    • International Journal of Critical Infrastructures – selected new articles [Abstracts / Request]:
    • Perlroth, N. (2013, Jan. 30). Hackers in China Attacked The Times for Last 4 Months. New York Times. [Read]
    • SANS – newly available papers [full text]:
    • Security & Communication Networks – new issue [Abstracts / Request]:
    • Villasenor, J. (2012, Jan. 29). The Two Classes of Cyber Threats [Brookings]. [Read]
    • United States. Office of the Director of National Security. (2013, Jan.). Information Paper: Description of Civil Liberties and Privacy Protections Incorporated in the Updated National Counter Terrorism Center Guidelines. [Read]
    • Wakefield, J. (2013, Jan. 31). Experts Warn on Wire-tapping of the Cloud. BBC. [Read]

Calls for Papers

Creative Commons License
Cybersecurity Update by UMUC / ILS is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.