Reading list for Computer Security
Week 1
Week 3
- K. S. Wilson, “Conflicts Among the Pillars of Information Assurance,” in IT Professional, vol. 15, no. 4, pp. 44-49, July-Aug. 2013, doi: 10.1109/MITP.2012.24.
- H. Sinanović and S. Mrdovic, “Analysis of Mirai malicious software,” 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, 2017, pp. 1-5, doi: 10.23919/SOFTCOM.2017.8115504.
- A. Woodiss-Field and M. N. Johnstone, “Assessing the Suitability of Traditional Botnet Detection against Contemporary Threats,” 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT), Sydney, Australia, 2020, pp. 18-21, doi: 10.1109/ETSecIoT50046.2020.00008.
- Scott R. Fluhrer, Itsik Mantin, and Adi Shamir. 2001. Weaknesses in the Key Scheduling Algorithm of RC4. In Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography (SAC ‘01). Springer-Verlag, Berlin, Heidelberg, 1–24.
- Hal Berghel and Jacob Uecker. 2005. WiFi attack vectors. Commun. ACM 48, 8 (August 2005), 21–28. DOI:https://doi.org/10.1145/1076211.1076229
- K. Lounis and M. Zulkernine, “Attacks and Defenses in Short-Range Wireless Technologies for IoT,” in IEEE Access, vol. 8, pp. 88892-88932, 2020, doi: 10.1109/ACCESS.2020.2993553.
Week 4
- D. E. Denning, “An Intrusion-Detection Model,” in IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222-232, Feb. 1987, doi: 10.1109/TSE.1987.232894.
- R. A. Kemmerer and G. Vigna, “Intrusion detection: a brief history and overview,” in Computer, vol. 35, no. 4, pp. supl27-supl30, April 2002, doi: 10.1109/MC.2002.1012428.
- S. Wang, C. Xia and T. Wang, “A Novel Intrusion Detector Based on Deep Learning Hybrid Methods,” 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), Washington, DC, USA, 2019, pp. 300-305, doi: 10.1109/BigDataSecurity-HPSC-IDS.2019.00062.
- The NSL-KDD dataset.
Week 5
Week 6
- Harbian on Github
- S. Grzonkowski, A. Mosquera, L. Aouad and D. Morss ‘Smartphone security: an overview of emerging threats’, IEEE Consumer Electronics Magazine 3(4) Oct 2014, pp.40–44.
- Wang, Y., W. Cai, T. Gu and W. Shao ‘Your eyes reveal your secrets: an eye movement based password inference on smartphone’, IEEE Transactions on Mobile Computing 19(11) 2020, pp.2714–2730.
- S. Sultan, I. Ahmad and T. Dimitriou, “Container Security: Issues, Challenges, and the Road Ahead,” in IEEE Access, vol. 7, pp. 52976-52996, 2019, doi: 10.1109/ACCESS.2019.2911732.
Week 7
Week 8
Week 9
Week 10
Week 11
- Hashing - Buchanan, W.J. Cryptography. (Denmark: River Publishers, 2017) Chapter 3 Hashing pp. 87-112.
Week 12
Week 13
Week 17
Week 18
Week 19
Week 20