Skip Navigation

Scout Archives

Home Projects Publications Archives About Sign Up or Log In

Browse Resources

Computer security -- Research

Resources

Anti-Terrorism Technology

The September 11 terrorist attacks have spurred intense research efforts to develop new and better technologies that can be used in the War on Terror. Whether these innovations are designed to combat immediate threats or prevent future disasters, they will undoubtedly save lives. The Bridge (1) is a quarterly publication of the National Academy of Engineering. The latest issue is comprised of...

https://scout.wisc.edu/report/nsdl/met/2002/0607
BlackHat Media Archives

This massive archive of presentations is offered for "the world wide computer security community." The archive can be accessed at no cost, and mainly consists of slide presentations from BlackHat conferences and conventions. These events began in 1997 to help professionals assess potential risks and recognize areas most vulnerable to security breaches. The material available in the archive...

https://www.blackhat.com/html/archives.html
Computer Security Resource Center (CSRC): History of Computer Security

This Web site serves as a collection of seminal research papers that "every serious student of computer security should read." Mostly from the 1970's but also stretching into the '80s, the papers were first collectively distributed at the 1998 National Information Systems Security Conference but are now offered online to make them more widely available. Each paper contributed to computer security...

https://csrc.nist.gov/csrc/media/publications/conference-pap...
Screenshot
Pew Research Center: Americans and Cybersecurity

How concerned is the average American about a cyberattack? How many Americans have personally experienced breaches of cybersecurity? Do Americans trust the federal government to protect them from cyberattacks? Do they trust social network sites, such as Facebook and Twitter, to protect their cybersecurity? In January 2017, the Pew Research Center released a 43-page report investigating American...

https://www.pewresearch.org/internet/2017/01/26/americans-an...
TCPA: Trusted Computing Platform Alliance

The Trusted Computing Platform Alliance (TCPA) is one of the most high-profile operations for the development and adoption of an industry standard for personal computer security. The main participants in the TCPA are Compaq, HP, IBM, Intel, and Microsoft. This Web site has many documents written for or about the alliance. The most significant resource is the latest version of the main...

https://mako.cc/talks/20030416-politics_and_tech_of_control/...
The Information Warfare Site (IWS)

Based in the UK, IWS is "an online resource that aims to stimulate debate about a range of subjects from information security to information operations and e-commerce," with an emphasis on offensive and defensive information operations. To these ends, it offers a number of resources, including selected documents, articles, and online journals that relate to twelve topics, such as computer...

https://iwar.org.uk/
Usability and privacy: a study of Kazaa P2P file-sharing

Published on the Hewlett Packard (HP) Web site, this report finds that a large percentage of Kazaa users have either accidentally or unknowingly shared their private files with everyone who has access to the Kazaa network. Conducted by Nathaniel S. Good of HP Labs and Aaron Krekelberg of the University of Minnesota, this study discloses shortcomings in the Kazaa software, which in turn, poses a...

https://www.hpl.hp.com/techreports/2002/HPL-2002-163.html?ju...