Science of Security (SoS) Newsletter (2015 - Issue 5)
SoS Newsletter- Advanced Book Block
Science of Security (SoS) Newsletter (2015 - Issue 5)
Each issue of the SoS Newsletter highlights achievements in current research, as conducted by various global members of the Science of Security (SoS) community. All presented materials are open-source, and may link to the original work or web page for the respective program. The SoS Newsletter aims to showcase the great deal of exciting work going on in the security community, and hopes to serve as a portal between colleagues, research projects, and opportunities.
Please feel free to click on any issue of the Newsletter, which will bring you to their corresponding subsections:
- In the News
- Conferences
- Publications of Interest
- Upcoming Events of Interest.
Publications of Interest
The Publications of Interest provides available abstracts and links for suggested academic and industry literature discussing specific topics and research problems in the field of SoS. Please check back regularly for new information, or sign up for the CPSVO-SoS Mailing List.
Table of Contents
Science of Security (SoS) Newsletter (2015 - Issue 5)
- In the News (2015 - Issue 5)
- International Security Related Conferences (2015 - Issue 5)
- International Conferences: Software Analysis, Evolution and Reengineering (SANER) Quebec, Canada
- International Conferences: Cloud Engineering (IC2E), 2015 Arizona
- International Conferences: CODASPY 15, San Antonio, Texas
- International Conferences: Cryptography and Security in Computing Systems, 2015, Amsterdam
- International Conferences: Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2015 Singapore
- International Conferences: Software Testing, Verification and Validation Workshops (ICSTW), Graz, Austria
- International Conferences: Workshop on Security and Privacy Analytics (IWSPA) ’15, San Antonio, Texas
- Publications of Interest (2015 - Issue 5)
- Cryptology and Data Security, 2014
- Deterrence
- Deterrence, 2014 (ACM Publications)
- Elliptic Curve Cryptography from ACM, 2014, Part 1
- Elliptic Curve Cryptography from ACM, 2014, Part 2
- Hard Problems: Predictive Security Metrics (ACM)
- Hard Problems: Predictive Security Metrics (IEEE)
- Hard Problems: Resilient Security Architectures (ACM)
- Journal: IEEE Transactions on Information Forensics and Security, March 2015
- Malware Analysis, 2014, Part 1 (ACM)
- Malware Analysis, 2014, Part 2 (ACM)
- Malware Analysis, Part 1
- Malware Analysis, Part 2
- Malware Analysis, Part 3
- Malware Analysis, Part 4
- Malware Analysis, Part 5
- Resilient Security Architectures (IEEE)
- Smart Grid Security
- Software Security, 2014 (ACM), Part 1
- Software Security, 2014 (ACM), Part 2
- Software Security, 2014 (IEEE), Part 1
- Software Security, 2014 (IEEE), Part 2
- Trustworthy Systems, Part 1
- Trustworthy Systems, Part 2
- SoS Lablet Quarterly Meeting - CMU
- Upcoming Events of Interest (2015 - Issue 5)
(ID#:15-5926)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to news@scienceofsecurity.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.