Login to filter by course Login to filter by course Reset
Cybersecurity: Vulnerabilities and ExploitsExplores cybersecurity vulnerabilities, exploits, and attacks, including nation agent motivations, vulnerability types, exploit processes, and phishing tactics during crises.
Trustworthy Systems ResearchDiscusses the need for proven trustworthiness in computer systems and the rigorous approach to achieving true trustworthiness in critical systems.
Access control: introductionCovers the concept of access control in computer security, its importance, implementation, and policy decision approaches.
Signal: Security AnalysisExplores the formal security analysis of the Signal Messaging Protocol, covering key concepts and highlighting limitations and results.