We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

The Art and Science of Security Research

00:00

Formal Metadata

Title
The Art and Science of Security Research
Title of Series
Number of Parts
122
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Research is a tricky thing, full of pitfalls, blind alleys, and rich rewards for the individual and humanity. This talk studies the art and science of conducting security research, from the genesis of your idea through experimentation and refinement to publication and beyond. In this talk you will learn how to generate and select powerful ideas, build upon the work of others, conduct groundbreaking work, and share your results for maximum desired effect. Whether you are a lone researcher or part of a large cabal you will take away ideas and techniques for maximizing the impact of your work, lest it lay dormant or have someone else rediscover your idea several years later. Greg Conti is an Academy Professor and Director of West Point's Cyber Security Research Center. He is the author of Security Data Visualization (No Starch Press) and Googling Security (Addison-Wesley) as well as over 40 articles and papers covering online privacy, usable security, security data visualization, and cyber warfare. His work can be found at www.gregconti.com and www.rumint.org.
Goodness of fitBitInformation securityNeuroinformatikMultiplication signComputer scienceProcess (computing)Exception handlingMeeting/Interview
TheoryExpert systemLine (geometry)Hacker (term)Constraint (mathematics)MomentumOutlierLengthRepresentation (politics)Hand fanOnline helpDigital photographyGroup actionThermal conductivityExpert systemFreewareContext awarenessTable (information)Line (geometry)LengthHacker (term)Chemical equationInformationDifferent (Kate Ryan album)OutlierAuthorizationAreaSphereNumberLibrary (computing)Social classMultiplication signFile archiverShared memoryTerm (mathematics)Point (geometry)BitCoefficient of determinationPublic-key cryptographyComputer animation
Chi-squared distributionCommunications protocolComputer hardwareSoftwareStrategy gameVisualization (computer graphics)Hard disk driveHacker (term)Computer fileArchaeological field surveyDependent and independent variablesInformationPattern languagePhysical systemSpacetimeMalwareLecture/Conference
Maxima and minimaInterface (computing)Error messageExploit (computer security)File formatInteractive televisionPlastikkarteVideo trackingMultiplicationFunction (mathematics)GoogolStructural loadWeb pageQuery languageSampling (statistics)AverageDiagramMetropolitan area networkHard disk driveGreatest elementCartesian coordinate systemFile formatCombinational logicPower (physics)DatabaseVulnerability (computing)Web pageAreaInterface (computing)Interactive televisionSign (mathematics)TrailPoint (geometry)Graphical user interfaceBitWeb browserStrategy gameCubeState of matterLecture/Conference
Computer-generated imageryVideoconferencingRhombusState of matterInfinityIRIS-TExecution unitLaceMultitier architectureArithmetic meanScalable Coherent InterfaceSpektrum <Mathematik>Wireless LANInformation securityArchaeological field surveyType theoryProcess (computing)Row (database)Noise (electronics)Artificial neural networkReal numberFacebookArchaeological field surveyInformation securityState of matterSoftwareVisualization (computer graphics)Interface (computing)Information privacySystem callTablet computerGoodness of fitOcean currentRevision controlDigitizingElectronic mailing listEvent horizon
Physical systemSource codeEncryptionElectronic mailing listDegree (graph theory)Vector potentialCoding theoryComputer hardwareData miningVisualization (computer graphics)TheoryInformationWritingElectronic signatureRow (database)Conservation lawWeb pagePermanentSimultaneous localization and mappingSoftware engineeringPlastikkarteVideo gameStress (mechanics)Capability Maturity ModelParallel portEmailPay televisionLie groupStack (abstract data type)Data managementMoving averageAriana TVSicGraph (mathematics)Binary fileGoogolBuildingUsabilityAnalogyRow (database)MassCombinational logicDatabaseSet (mathematics)TimestampSelf-organizationMoment (mathematics)TextsystemAuthorizationMultiplication signData miningReading (process)Graphics tabletVideo gameOffice suiteTouch typingStress (mechanics)Digital libraryWebsiteBitMereologyPoint (geometry)Process (computing)Lecture/ConferenceComputer animation
MathematicsLie groupLibrary (computing)MaizeVideo gameEvent horizonMathematicianGame theoryNP-hardManufacturing execution systemTerm (mathematics)Decision theoryMachine visionARPANETString (computer science)Heat transferInformation securityHacker (term)CybersexTrailShared memoryInternet forumMeta elementAuthorizationText editorMultiplication signEvaporationMathematicsComputer programmingData managementVideo gameCrash (computing)CybersexMathematicianSeries (mathematics)Chemical equationStrategy gameAreaExistential quantificationDecision theoryWritingProcess (computing)String (computer science)TrailMusical ensembleType theoryMetropolitan area networkFreewareFocus (optics)Computer animationLecture/Conference
Rule of inferenceNetiquetteGraphic designExplosionHypothesisSoftware testingInclusion mapGroup actionSpacetimeCollisionVulnerability (computing)Information securityScalable Coherent InterfaceComputer hardwarePlastikkarteReading (process)Design by contractSoftwareInformation securitySoftware testingMultiplication signGoodness of fitResultantTouch typingTraffic reportingProjective planeIntegrated development environmentSpacetimeRight angleGroup actionShared memoryCollisionHypothesisMultiplicationStrategy gameComputer animationLecture/Conference
Inclusion mapFeedbackTimestampOnline helpBuildingMechanism designLibrary (computing)AbstractionElectronic mailing listImplementationPerformance appraisalMathematical analysisData structureExplosionHierarchyAreaInformation securityHand fanGame theoryPoint (geometry)Maxwell's equationsScalable Coherent InterfaceDatabase normalizationType theoryFunction (mathematics)Internet forumHacker (term)Traffic reportingWritingTimestampComputer fontGradientDifferent (Kate Ryan album)Student's t-testSet (mathematics)Core dumpSlide rulePerformance appraisalState of matterAreaTerm (mathematics)VideoconferencingFeedbackRight angleAnalogyDatabaseCircleEndliche ModelltheorieInformation securityFile formatDemosceneLecture/ConferenceComputer animation
Bit rateFile formatComputer programCalculationCopyright infringementTerm (mathematics)HypermediaMaxima and minimaNatural numberAuthorizationContext awarenessHypermediaCalculationEvent horizonStrategy gameMathematicsMultiplication signPoint (geometry)Covering spaceNeuroinformatikFreewareLecture/Conference
Open setProcess (computing)outputChemical equationHacker (term)Library (computing)Execution unitParsingEmpennageWebsiteMereologyChemical equationCodeLine (geometry)Library (computing)Hacker (term)WebsiteFile archiverPhysical lawPoint (geometry)Form (programming)Theory of relativityProgrammer (hardware)Multiplication signSpacetimeOpen setEmailProcess (computing)MetadataSearch engine (computing)Function (mathematics)Coefficient of determinationCASE <Informatik>InformationHypermediaInformation securityInstant MessagingLecture/ConferenceComputer animation
Hacker (term)Slide ruleMultiplication signStrategy gameHacker (term)Computer-assisted translationGoodness of fitInformation security
SpacetimeIRIS-TSystem programmingDemosceneSpacetimeElectronic mailing listWebsite1 (number)Lecture/Conference
Transcript: English(auto-generated)