ENISA - Annual Report Telecom Security Incidents 2017, 31 pages, August 2018.
eConflicts is a blog written by Daniel Ventre, about cyberconflicts, cyberwar, cybersecurity / cyberdefense, information warfare, cybercrime, political science and international relations
Total Pageviews
Saturday, September 1, 2018
Thursday, August 30, 2018
Persecução Penal do Hate Speech no Ciber Espaço
"Persecução Penal do Hate Speech no Ciber Espaço", Monique Patricia Ferreira Lima; Guilherme Caselli de Araújo, Estudos contemporâneos de polícia judiciária, São Paulo, Agosto, 2018, pp.59-68
Updated version of the DoD Dictionary of Military and Associated Terms
"DoD Dictionary of Military and Associated Terms", new version, as of August 2018. The list of modifications is available on page 385 of the document.
Wednesday, August 29, 2018
Cyber Defense : bilateral cooperation between Chile and the U.S.A
"Secretary Mattis and Minister Espina affirmed the strong military-to-military cooperation between the
Chilean and U.S . Armed Forces, including efforts to foster collaboration and cooperation in cyber
defense". More details...
Prevalence and forms of cybercrime perpetrated by students in public tertiary institutions in Ekiti state
"Prevalence and forms of cybercrime perpetrated by students in public tertiary institutions in Ekiti state", article by Prevalence and forms of cybercrime perpetrated by students in public tertiary institutions in Ekiti state, International Journal of Economics, Business and Management Research, Vol. 2, No. 04; 2018.
Tuesday, August 28, 2018
Prosecuting cybercrime: the experience of Singapore
"Prosecuting cybercrime: the experience of Singapore", Speech by Attorney-General of the Republic of Singapore, Lucien Wong, S.C., 11th China-ASEAN Prosecutors-General Conference, Brunei Darussalam, 14 August 2018
Monday, August 27, 2018
An Argument for Interdisciplinary Programs in Cybersecurity
Dennis Giever, "An Argument for Interdisciplinary Programs inCybersecurity", International Journal of Cybersecurity Intelligence & Cybercrime, Vol.1, Issue 1, August 2018, pp. 69-73.
Architecture of aggression in cyberspace: Testing cyber aggression in young adults in Hungary
Katalin Parti, Tibor Kiss, Gergely Koplanyi, "Architecture of aggression in cyberspace: Testing cyber aggression in young adults in Hungary", International Journal of Cybersecurity Intelligence & Cybercrime, Vol.1, Issue 1, August 2018, pp. 56-68.
"In order to test whether and how violence is exacerbated in online social networking sites, we utilized the BryantSmith
Aggression Scale (Bryant & Smith, 2001), and included examples in the questionnaire offering solutions
for 7 different hypothetical cases occurring online (Kiss, 2017)...."
Conference: "Evidence in the Cloud: new challenges in collecting evidence on cyberspace in the European Union"
Conference: "Evidence in the Cloud: new challenges in collecting evidence on cyberspace in the European Union". EJTN Criminal Justice Seminar. 27-28 September, 2018. High School for Judiciary – Scandicci (Florence). Programme.
Conference: "Strengthening Capacities in Internet Governance in Africa”
ITU Annual Regional Human Capacity Building Workshop on "Strengthening Capacities in Internet Governance in Africa”, Abuja, 27-29 August, 2018. Programme.
Sunday, August 26, 2018
#IslamicState: An Analysis of Tweets in Support of ISIS After the November 2015 Attacks In Paris
"#IslamicState: An Analysis of Tweets in Support of ISIS After the November 2015 AttacksIn Paris", thesis by Amanda R. Guthrie, Faculty of
Auburn University, August 2018, 102 pages.
This study is based on content analysis of 16,891 Tweets posted after
the 2015 Attacks in Paris.
Saturday, August 25, 2018
China-U.S. Trade Issues - Congressional Research Service
Wayne M. Morrison, "China-U.S. Trade Issues" - Congressional Research Service, July 30, 2018, 91 pages, Washington.
Read the chapter on Cybersecurity Issues (pp.45-49)
Friday, August 24, 2018
The internet of things: applications and challenges for the RSAF
"The internet of things: applications and challenges for the RSAF", by ME6(DR) Reuben Lim Chi Keong, MAJ Pek Wee Kian & ME5 David Bey. Pointer, Journal of the Singapore Armed Forces, Vol. 44, n°2, 2018, pp.24-34, Singapore.
"What is this IoT? Is it just about wearable smartwatches, or does it hold more potential? More importantly,
how can it be applied in a military context to the Republic of Singapore Air Force (RSAF), enabling a shift in
non real-time, human-centric operations, to real-time, machine-centric operations? This essay explores how
IoT will quicken and broaden the traditional Observe-Orient-Decide-Act (OODA) loop, and investigates how IoT
can be applied to improve operations in a ‘smart airbase’..."
From Digital Traces to Algorithmic Projections
"From Digital Traces to Algorithmic Projections", by Thierry Berthier and Bruno Teboul, ISTE Press - Elsevier, 184 pages, October 2018.
"From Digital Traces to Algorithmic Projections describes individual digital fingerprints in interaction with the different algorithms they encounter throughout life. Centered on the human user, this formalism makes it possible to distinguish the voluntary projections of an individual and their systemic projections (suffered, metadata), both open (public) and closed. As the global algorithmic projection of an individual is now the focus of attention (Big Data, neuromarketing, targeted advertising, sentiment analysis, cybermonitoring, etc.) and is used to define new concepts, this resource discusses the ubiquity of place and the algorithmic consent of a user."
Reading Thieves’ Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces
"Reading Thieves’ Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces", by Kan Yuan, Haoran Lu, Xiaojing Liao, and XiaoFeng Wang, Indiana University Bloomington, Proceedings of the
27th USENIX Security Symposium.
August 15–17, 2018 • Baltimore, MD, USA.
"Underground communication is invaluable for understanding
cybercrimes. However, it is often obfuscated
by the extensive use of dark jargons, innocently-looking
terms like “popcorn” that serves sinister purposes (buying/selling
drug, seeking crimeware, etc.). Discovery and
understanding of these jargons have so far relied on manual
effort, which is error-prone and cannot catch up with
the fast evolving underground ecosystem. In this paper,
we present the first technique, called Cantreader, to automatically
detect and understand dark jargon..."
Subscribe to:
Comments (Atom)