journals, and well-reputed magazines. Not sure if your source is scholarly? Please consult your instructor.

In this project you will investigate cutting edge issues, developments, and breakthroughs in contemporary cybersecurity. You will read 6 scholarly articles, write a scholarly analysis of the articles you read. Please follow the guidelines below carefully: 1. Read a scholarly article from the list at the end of this section. 2. Read articles on the web. Please note. Not everything you find on the web is a scholarly source. Please stick to publications from conferences, journals, and well-reputed magazines. Not sure if your source is scholarly? Please consult your instructor. After reading the above articles, you will write a scholarly, critical analysis of the cybsersecurity issue under investigation. Please follow the following guidelines: • Provide a 1-2 page summary for . • What is the problem addressed in the paper? • Do you think the problem is important? Why? • How does the paper address the problem? provide a summary of technical details. • What are the contributions of the paper? • What are the strengths and weakness of the paper? • Your approach, if there is any. • Any other points you want to make. • Clearly written using your own words. An Analysis of Private Browsing Modes in Modern Browsers Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing Above the Clouds: A Berkeley View of Cloud Computing. 4. Utility Based Anonymization for Privacy Preservation with Less Information Loss 5. Inferring Privacy Information from Social Networks 6. Database Security Protection via Inference Detection 7. Cleartext Passwords in Linux Memory 8. Data lifetime is a systems problem 9. Shredding your garbage: reducing data lifetime through secure deallocation 10. Detecting Kernel-Level Rootkits Through Binary Analysis 11. Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels CleanOS: Limiting Mobile Data Exposure with Idle Eviction Integrity checking in remote computation A Virtual Machine Introspection Based Architecture for Intrusion Detection (Sections 1-4, 8, 9). Are Usability and Security Two Opposite Directions in Computer Systems? 16. Do Security Toolbars Actually Prevent Phishing Attacks? 17. Towards Privacy-aware Location-based Database 18. Online privacy analysis and hints for its improvement 20. Security and privacy for implantable medical devices. How Much is Location Privacy Worth? Privacy-aware people-centric sensing Thank you