{"id":19,"date":"2023-10-06T18:07:53","date_gmt":"2023-10-06T18:07:53","guid":{"rendered":"https:\/\/www.isi.edu\/people-mirkovic\/?page_id=19"},"modified":"2023-10-18T21:18:48","modified_gmt":"2023-10-18T21:18:48","slug":"links","status":"publish","type":"page","link":"https:\/\/www.isi.edu\/people-mirkovic\/links\/","title":{"rendered":"Links"},"content":{"rendered":"\n<section>\n    <h2>General network security<\/h2>\n<\/section>\n\t<ul>\n<li><a href=\"http:\/\/www.cert.org\/\" target=\"_blank\" rel=\"noopener\">CERT<\/a><\/li>\n<li><a href=\"http:\/\/staff.washington.edu\/dittrich\/\" target=\"_blank\" rel=\"noopener\">Dave Dittrich&#8217;s Web page with lots of security related links<\/a><\/li>\n<li><a href=\"http:\/\/www.crypto.com\/\" target=\"_blank\" rel=\"noopener\">Cryptography resources<\/a><\/li>\n<li><a href=\"http:\/\/www.shoretel.com\/community\/web-communication.html\/\" target=\"_blank\" rel=\"noopener\">Overview of encryption and network security<\/a><\/li>\n<li><a href=\"https:\/\/www.bookyourdata.com\/email-list-database\/cryptography-network-security-computers-email\" target=\"_blank\" rel=\"noopener\">Crypto for email (contributed by Conner)<\/a><\/li>\n<li><a href=\"https:\/\/securitybaron.com\/blog\/cryptography-and-coding-information\/\" target=\"_blank\" rel=\"noopener\">Cryptography and coding (contributed by Eva Russell and her students)<\/a><\/li>\n<li><a href=\"https:\/\/security.online.gwu.edu\/articles\/staying-safe-online-with-cybersecurity-information.html\" target=\"_blank\" rel=\"noopener\">Crypto and network security overview (contributed by Chris)<\/a><\/li>\n<li><a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/encryption-types-explained\/\" target=\"_blank\" rel=\"noopener\">Common encryption types explained (by Josh Lake)<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<section>\n    <h2>Blockchain and cryptocurrency<\/h2>\n<\/section>\n\t<ul>\n<li><a href=\"https:\/\/www.moneygeek.com\/crypto\/terms\/what-is-blockchain-technology\/\" target=\"_blank\" rel=\"noopener\">Blockchain basics<\/a><\/li>\n<li><a href=\"https:\/\/www.moneygeek.com\/crypto\/terms\/what-is-cryptocurrency\/\" target=\"_blank\" rel=\"noopener\">What is cryptocurrency<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<section>\n    <h2>Distributed denial-of-service<\/h2>\n<\/section>\n\t<ul>\n<li><a href=\"http:\/\/staff.washington.edu\/dittrich\/misc\/ddos\/\" target=\"_blank\" rel=\"noopener\">Dave Dittrich&#8217;s DDoS page<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<section>\n    <h2>Worms<\/h2>\n<\/section>\n\t<ul>\n<li><a href=\"http:\/\/www.wormblog.com\/\" target=\"_blank\" rel=\"noopener\">Wormblog.com &#8211; A blog about the worm problem, technology, detection and defenses<\/a><\/li>\n<li><a href=\"http:\/\/www.networm.org\/\" target=\"_blank\" rel=\"noopener\">Networm.org &#8211; Worm Information Center<\/a><\/li>\n<li><a href=\"http:\/\/www.eeye.com\/\" target=\"_blank\" rel=\"noopener\">eEye Digital Security &#8211; Worm research and some disassembled worms<\/a><\/li>\n<li><a href=\"http:\/\/www.lsd-pl.net\/\" target=\"_blank\" rel=\"noopener\">LSD research group &#8211; C code for some common exploits<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<section>\n    <h2>Conferences and journals<\/h2>\n<\/section>\n\t<ul>\n<li><a href=\"http:\/\/www.computer.org\/security\/\" target=\"_blank\" rel=\"noopener\">IEEE Security and Privacy Magazine<\/a><\/li>\n<li><a href=\"http:\/\/www.computer.org\/tdsc\/\" target=\"_blank\" rel=\"noopener\">IEEE Transactions on Dependable and Secure Computing<\/a><\/li>\n<li><a href=\"http:\/\/www.nspw.org\/current\/\" target=\"_blank\" rel=\"noopener\">New Security Paradigms Workshop<\/a><\/li>\n<li><a href=\"http:\/\/www.ieee-infocom.org\/\" target=\"_blank\" rel=\"noopener\">INFOCOM<\/a><\/li>\n<li><a href=\"http:\/\/www.acm.org\/sigcomm\/\" target=\"_blank\" rel=\"noopener\">SIGCOMM<\/a><\/li>\n<li><a href=\"http:\/\/www.isoc.org\/isoc\/conferences\/ndss\/\" target=\"_blank\" rel=\"noopener\">Network and Distributed System Security Symposium<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>General network security CERT Dave Dittrich&#8217;s Web page with lots of security related links Cryptography resources Overview of encryption and network security Crypto for email (contributed by Conner) Cryptography and coding (contributed by Eva Russell and her students) Crypto and network security overview (contributed by Chris) Common encryption types explained (by Josh Lake) &nbsp; Blockchain&hellip;<\/p>\n","protected":false},"author":421,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"news_source":"","news_author":"","external_news_link":"","footnotes":""},"class_list":["post-19","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Links - Jelena Mirkovic<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.isi.edu\/people-mirkovic\/links\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Links - Jelena Mirkovic\" \/>\n<meta property=\"og:description\" content=\"General network security CERT Dave Dittrich&#8217;s Web page with lots of security related links Cryptography resources Overview of encryption and network security Crypto for email (contributed by Conner) Cryptography and coding (contributed by Eva Russell and her students) Crypto and network security overview (contributed by Chris) Common encryption types explained (by Josh Lake) &nbsp; Blockchain&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.isi.edu\/people-mirkovic\/links\/\" \/>\n<meta property=\"og:site_name\" content=\"Jelena Mirkovic\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-18T21:18:48+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.isi.edu\/people-mirkovic\/links\/\",\"url\":\"https:\/\/www.isi.edu\/people-mirkovic\/links\/\",\"name\":\"Links - Jelena Mirkovic\",\"isPartOf\":{\"@id\":\"https:\/\/www.isi.edu\/people-mirkovic\/#website\"},\"datePublished\":\"2023-10-06T18:07:53+00:00\",\"dateModified\":\"2023-10-18T21:18:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.isi.edu\/people-mirkovic\/links\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.isi.edu\/people-mirkovic\/links\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.isi.edu\/people-mirkovic\/links\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.isi.edu\/people-mirkovic\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Links\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.isi.edu\/people-mirkovic\/#website\",\"url\":\"https:\/\/www.isi.edu\/people-mirkovic\/\",\"name\":\"Jelena Mirkovic\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.isi.edu\/people-mirkovic\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Links - Jelena Mirkovic","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.isi.edu\/people-mirkovic\/links\/","og_locale":"en_US","og_type":"article","og_title":"Links - Jelena Mirkovic","og_description":"General network security CERT Dave Dittrich&#8217;s Web page with lots of security related links Cryptography resources Overview of encryption and network security Crypto for email (contributed by Conner) Cryptography and coding (contributed by Eva Russell and her students) Crypto and network security overview (contributed by Chris) Common encryption types explained (by Josh Lake) &nbsp; Blockchain&hellip;","og_url":"https:\/\/www.isi.edu\/people-mirkovic\/links\/","og_site_name":"Jelena Mirkovic","article_modified_time":"2023-10-18T21:18:48+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.isi.edu\/people-mirkovic\/links\/","url":"https:\/\/www.isi.edu\/people-mirkovic\/links\/","name":"Links - Jelena Mirkovic","isPartOf":{"@id":"https:\/\/www.isi.edu\/people-mirkovic\/#website"},"datePublished":"2023-10-06T18:07:53+00:00","dateModified":"2023-10-18T21:18:48+00:00","breadcrumb":{"@id":"https:\/\/www.isi.edu\/people-mirkovic\/links\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.isi.edu\/people-mirkovic\/links\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.isi.edu\/people-mirkovic\/links\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.isi.edu\/people-mirkovic\/"},{"@type":"ListItem","position":2,"name":"Links"}]},{"@type":"WebSite","@id":"https:\/\/www.isi.edu\/people-mirkovic\/#website","url":"https:\/\/www.isi.edu\/people-mirkovic\/","name":"Jelena Mirkovic","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.isi.edu\/people-mirkovic\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/pages\/19","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/comments?post=19"}],"version-history":[{"count":0,"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/pages\/19\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.isi.edu\/people-mirkovic\/wp-json\/wp\/v2\/media?parent=19"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}