Overview

This page provides information on some of the resources available for students in CIS 6614.

This page is organized as follows:

Return to top

UCF Library Resources

The UCF Library has a general guide to the literature in Computer Science, which is found at:

Return to top

Web and Social Media Resources

Some useful web resources related to this course are:

See also the list of Top Security Blogs and Websites by Michelle Moore of UCSD.

Return to top

Threat Modeling Tools

The following tools may be useful for threat modeling:

See also the Threat Modeling Manifesto.

The following YouTube videos might be useful as well:

Return to top

Professional Societies

There are two main professional societies in computing, the Association for Computing Machinery (ACM) and the Institute for Electrical and Electronics Engineers (IEEE). The UCF Library gives access to all publications of these professional societies. Both the ACM and IEEE Computer Society have student memberships and student chapters at UCF.

Another important resource for publications and conferences in security is USENIX, which makes several publications available. USENIX also has student memberships.

Another professional society is the (ISC)2, which is "an international, nonprofit membership association for information security leaders." The (ISC)2 focuses on cybersecurity and has certifications.

ACM

The ACM has several resources for members, including a learning center.

The ACM also has various special interest groups (SIGs) that focus on particular areas of computing. Some SIGs that are relevant for this course include:

IEEE Computer Society

The IEEE contains the Computer Society, which "advances the theory, practice, and application of computer and information-processing science and technology, as well as the professional standing of its members." Its educational resources relevant to this course include:

USENIX

USENIX makes several publications available. USENIX also has student memberships.

Return to top

Other Resources

Conferences

The following are considered the top academic conferences in Computer Security:

The following conferences are also relevant to this course (and perhaps more focused on topics relevant to the course):

Guofei Gu has a useful list of computer security conferences.

Journals

The following journals give examples of professional writing in security. In most cases access to these is free from the UCF library.

Online Resources

The following are some other useful resources.

Return to top

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

Last modified Friday, August 9, 2024.

This web page is for CIS 6614 at the University of Central Florida. The details of this course are subject to change as experience dictates. You will be informed of any changes. Please direct any comments or questions to Gary T. Leavens at Leavens@ucf.edu. Some of the policies and web pages for this course are quoted or adapted from other courses I have taught, in partciular, COP 4020.