Difference between revisions of "White Paper Projects"

From CyberSecurity
Jump to: navigation, search
 
(Project page to help team formation)
Line 1: Line 1:
*Nuclear Weapons
+
'''PLEASE READ'''<br>
**  
+
Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [http://www.cs.washington.edu/education/courses/csep590/05au/project.pdf] ''please clearly indicate if you think you are a "policy" student''.
*Chemical Weapons
+
 
**
+
*'''Nuclear Weapons'''
*Biological Weapons
+
**..
**  
+
*'''Chemical Weapons'''
*Radiological Weapons
+
**..
**
+
*'''Biological Weapons'''
*Privacy and Data
+
**..
**
+
*'''Radiological Weapons'''
*Encryption Policy
+
**..
**
+
*'''Privacy and Data'''
*Open Source and Cybersecurity
+
**..
**
+
*'''Encryption Policy'''
*Interrogation & Torture
+
**..
**
+
*'''Open Source and Cybersecurity'''
*State-Sponsored Hacking
+
**..
**
+
*'''Interrogation & Torture'''
*Cyberterrorism
+
**..
**
+
*'''State-Sponsored Hacking'''
*Cybersecurity and National Infrastructure
+
**..
**
+
*'''Cyberterrorism'''
*Cybersecurity and Law
+
**..
**
+
*'''Cybersecurity and National Infrastructure'''
*Cyber Criminal Activity
+
**..
**
+
*'''Cybersecurity and Law'''
*Liability
+
**..
**
+
*'''Cyber Criminal Activity'''
*Education, Exploits, Cyberculture
+
**Avichal Singh
**
+
**..
*Offense vs. Defense
+
*'''Liability'''
**
+
**..
 +
*'''Education, Exploits, Cyberculture'''
 +
**..
 +
*'''Offense vs. Defense'''
 +
**..
 +
 
 +
This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks.

Revision as of 18:44, 2 November 2005

PLEASE READ
Following is a list of suggested project topics. Please add your name for the topic(s) that you may be interested in. Try to add your name in only one or a few topics at most. Also feel free to add additional topics at the end. In order to meet the team formation guidelines [1] please clearly indicate if you think you are a "policy" student.

  • Nuclear Weapons
    • ..
  • Chemical Weapons
    • ..
  • Biological Weapons
    • ..
  • Radiological Weapons
    • ..
  • Privacy and Data
    • ..
  • Encryption Policy
    • ..
  • Open Source and Cybersecurity
    • ..
  • Interrogation & Torture
    • ..
  • State-Sponsored Hacking
    • ..
  • Cyberterrorism
    • ..
  • Cybersecurity and National Infrastructure
    • ..
  • Cybersecurity and Law
    • ..
  • Cyber Criminal Activity
    • Avichal Singh
    • ..
  • Liability
    • ..
  • Education, Exploits, Cyberculture
    • ..
  • Offense vs. Defense
    • ..

This page has been created by a student for students to assist in the process of team formation and bring together like-minded folks.