Pie charts are popular in newspapers, in magazines, and yes, even in presentations. This post is going to talk about why you should avoid pie charts...
Continue reading...Research Issues
DDOS, Defense, and… Research
In my days in industry, I used to deal with the occasional DDOS. I was even woken up by them. Our Network Management System would think...
Continue reading...Operating Systems Operate
When I got into this business, the distribution of operating systems was completely different from today. People had personal computers but there were also mainframes and...
Continue reading...False Positive/False Negative
I posted about the Base Rate Fallacy earlier this summer. I wanted to expand this discussion and talk about why I think False Positives and False...
Continue reading...Trust… But Verify
As researchers or cybersecurity professionals, we often use tools that other people wrote. Like… Ghidra, ClamAV, snort, tcpdump, wireshark… I could go on for a while...
Continue reading...The Once and Future Password
As a part of some recent research, I’ve found myself reading older papers in this field. It has been fascinating to consider the problems they saw...
Continue reading...Base Rate Fallacy
This blog is about DTRAP but at the same time, I want to talk about doing research. This is one of those “Doing research” topics that...
Continue reading...Statistics — A Mathematician’s View
I know I’ve said this before, but it bears repeating. I am not a statistician. I am a mathematician. My field of study is Algebraic Topology,...
Continue reading...How do you know…?
In my days in industry, I interviewed a lot of people. It’s hard to find the right person for a job sometimes, so I talked to...
Continue reading...U and Mption
This is a blog for ACM Digital Threats: Research and Practice (DTRAP) and I like to talk about not just Digital Threats, but making your research...
Continue reading...