Science of Security (SoS) Newsletter (2015 - Issue 3)
SoS Newsletter- Advanced Book Block
Science of Security (SoS) Newsletter (2015 - Issue 3)
Each issue of the SoS Newsletter highlights achievements in current research, as conducted by various global members of the Science of Security (SoS) community. All presented materials are open-source, and may link to the original work or web page for the respective program. The SoS Newsletter aims to showcase the great deal of exciting work going on in the security community, and hopes to serve as a portal between colleagues, research projects, and opportunities.
Please feel free to click on any issue of the Newsletter, which will bring you to their corresponding subsections:
- In the News
- Conferences
- Publications of Interest
- Lablet Activities
- Upcoming Events of Interest.
General Topics of Interest
General Topics of Interest reflects today's most popularly discussed challenges and issues in the Cybersecurity space. GToI includes news items related to Cybersecurity, updated information regarding academic SoS research, interdisciplinary SoS research, profiles on leading researchers in the field of SoS, and global research being conducted on related topics.
Publications
The Publications of Interest provides available abstracts and links for suggested academic and industry literature discussing specific topics and research problems in the field of SoS. Please check back regularly for new information, or sign up for the CPSVO-SoS Mailing List.
Table of Contents
Science of Security (SoS) Newsletter (2015 - Issue 3)
- HotSoS 2015 - Interest in Cybersecurity Science and Research Heats Up
- HotSoS 2015 - Research Presentations
- HotSoS 2015 - Tutorials
- International Security Related Conferences (2015 - Issue 3)
- International Conferences: Communication, Information & Computing Technology (ICCICT), 2015
- International Conferences: Conference on Networking Systems & Security (NSysS), Dhaka, Bangladesh
- International Conferences: Cryptography and Security in Computing Systems, Amsterdam, 2015
- International Conferences: Privacy and Security of Big Data, Shanghai, China, 2014
- Publications of Interest (2015 - Issue 3)
- Acoustic Fingerprints (2014 Year in Review)
- Android and iOS Encryption
- Anonymity and Privacy in Wireless Networks
- Attribution (2014 Year in Review) Part 1
- Attribution (2014 Year in Review) Part 2
- Authentication and Authorization (2014 Year in Review) Part 1
- Authentication and Authorization (2014 Year in Review) Part 2
- Automated Response Actions (2014 Year in Review)
- Big Data Security Issues (2014 Year in Review)
- Clean Slate (2014 Year in Review)
- Cross Layer Security (2014 Year in Review)
- Cross Site Scripting (2014 Year in Review)
- Moving Target Defense (2014 Year in Review)
- Science of Security (2014 Year in Review)
- Situational Awareness and Security - Part 1
- Situational Awareness and Security - Part 2
- Text Analytics Techniques (2014 Year in Review)
- SecUrity and Resilience (SURE) Review
- SURE Meeting Presentations 2015 March 17-18
- Upcoming Events of Interest (2015 - Issue 3)
(ID#:15-4085)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to news@scienceofsecurity.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.