BACKGROUND READING

This section outlines various background reading source material that attendees at Belfast 2012 were asked to review prior to taking part in the various group facilitated sessions.  They included:

1. Adaptive Cyber Security Technologies

As preparation for the group session, the co-facilitators (Igor Muttik, McAfee and Ulf Lindqvist, SRI International) have identified the following links as appropriate background reading. 

IBM patents from 90s that may have relevance to automatic malware recognition and remediation:

Federal R&D Plan:

DHS S&T Roadmap:

National Cyber Leap Year Summit 2009, Co-Chairs’ Report

 

2. Protection of Smart Utility Grids

As preparation for the group session, the co-facilitators (Sakir Sezer, CSIT and Barbara Fraser, Cisco) have identified the attached files as appropriate background reading:

 

3. Mobile Platforms and Applications

As preparation for the group session, the co-facilitators (Mark Crosbie, IBM and Frank Stajano, University of Cambridge, Computer Lab) have identified the attached files as appropriate background reading.

 

4. Multi-faceted Cyber Security Research

As preparation for the group session, the co-facilitators (Virgil Gilgor, CyLab and Chris Firth, Thales) have identified the following links as appropriate background reading.