ResourcesResources ResourcesThe resources below are available for free download. Please enter your email address and a download link will be sent to you. Predictably Deterrable? The Case of System Trespassers 217.69 KB 5 downloads Can computing environments deter system trespassers and increase intruders’ likelihood... Download Web-Based Intelligence for IDS 215.50 KB 7 downloads We and others have shown that machine learning can detect and mitigate web-based... Download Python Scrapers for Scraping Cryptomarkets on Tor 219.09 KB 13 downloads Cryptomarkets are commercial websites on the web that operates via the darknet, a... Download Risk, Communication & Governance 627.63 KB 13 downloads David F. Katz, Adams and Reese LLP, Presentation at Evidence Based Cybersecurity... Download Cybersecurity: Moving from Project to Process - Johnny Lee, J.D. 261.95 KB 11 downloads Johnny Lee, Grant Thornton LLP. Presentation at Evidence Based Cyber Security Event... Download Risk Management and "Market for Lemons" - Dr. David Maimon 691.74 KB 11 downloads Dr. David Maimon Presentation about Risk Management and "Market for Lemons" at an... Download Prompt Patching 257.88 KB 9 downloads A description about how Prompt vulnerability helps in providing cyber security. ... Download Passwords 196.18 KB 6 downloads How Passwords can help in authentication and help in preventing the development... Download Intrusion Detection System (IDS) 193.08 KB 12 downloads A device or software application that monitors a network or systems for malicious... Download Honeypots 191.29 KB 9 downloads Tools which permits the collection of information on hackers and real system trespassing... Download 12Next