White Paper

event

Visible to the public  CPS & IoT 2020
Jun 08, 2020 8:00 am - Jun 11, 2020 8:00 pm CEST

Call for Papers

CPS & IoT'2020

8th International Conference on Cyber-Physical Systems and Internet-of-Things

Budva, Montenegro

June 8-11, 2020

forum

Visible to the public Nullcon International Security Conference and Training Goa 2022

Nullcon Welcomes You!

Nullcon invites researchers and hackers around the world, working on the next big thing in security to submit their CFP. If you love security, hacking, cutting-edge research, and beaches then the universe will conspire to send you to Nullcon. No, seriously it's a lot of learning and fun! Time to tickle your gray cells and submit your research.

Nullcon is an annual security conference held in Goa, India. The focus of the conference is to showcase the next generation of offensive and defensive security technology.

forum

Visible to the public Call for Papers: 16th IEEE International Conference on Factory Communication Systems

Call for Papers

forum

Visible to the public Call for Papers: Resilience Week 2019 and Student Competition Extended to September 1

Call for Papers

Resilience Week: 2019 and Student Competition Extended to September 1 Due to Numerous Requests

San Antonio, TX

November 4-7, 2019

file

Visible to the public George Washington's Teachings on Cyberwar

George Washington called West Point, "the key to the continent." The reasoning that Washington employed in establishing the fortifications at West Point is instructive to modern cyber warriors.

file

Visible to the public Improving Cybersecurity Through Human Systems Integration 29 June 2016

Advanced Persistent Threat (APT) attackers accomplish their attack objectives by co-opting users' credentials. Traditional cyber defenses leave users vulnerable to APT attacks which employ spearphishing. The success of spearphishing attacks is not a data processing failure, but is the result of defenders failing to apply the principles of Human System Integration to the problem of spearphishing. We discuss an alternative defensive strategy which addresses human performance capabilities and limitations to disrupt spearphishing attacks.