reading-list-cdx

Using VisorFlow to Control Information Flow without Modifying the Operating System Kernel or its Userspace

Studying Naive Users and the Insider Threat with SimpleFlow

The Use of Cyber-Defense Exercises in Undergraduate Computing Education