Science of Security (SoS) Newsletter (2015 - Issue 7)
SoS Newsletter- Advanced Book Block
Science of Security (SoS) Newsletter (2015 - Issue 7)
Each issue of the SoS Newsletter highlights achievements in current research, as conducted by various global members of the Science of Security (SoS) community. All presented materials are open-source, and may link to the original work or web page for the respective program. The SoS Newsletter aims to showcase the great deal of exciting work going on in the security community, and hopes to serve as a portal between colleagues, research projects, and opportunities.
Please feel free to click on any issue of the Newsletter, which will bring you to their corresponding subsections:
- In the News
- Conferences
- Publications of Interest
- Upcoming Events of Interest.
Publications of Interest
The Publications of Interest provides available abstracts and links for suggested academic and industry literature discussing specific topics and research problems in the field of SoS. Please check back regularly for new information, or sign up for the CPSVO-SoS Mailing List.
Table of Contents
Science of Security (SoS) Newsletter (2015 - Issue 7)
- In the News
- International Security Related Conferences
- International Conferences: Conference on Information Science and Control Engineering (ICISCE), Shanghai, China
- International Conferences: Cyber and Information Security Research, Oak Ridge, TN
- International Conferences: Electronic Crime Research (eCrime) 2015, Spain
- International Conferences: Information Hiding & Multimedia Security, 2015, Portland, Oregon
- International Conferences: Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)
- International Conferences: SIGMETRICS ’15, Portland Oregon
- Publications of Interest
- Attack Graphs and Privacy, 2014
- Big Data Security Metrics, 2014
- Coding Theory and Security, 2014, Part 1
- Coding Theory and Security, 2014, Part 2
- Coding Theory and Security, 2014, Part 3
- Computing Theory and Composability, 2014
- Computing Theory and Security Metrics, 2014
- Computing Theory and Security Resilience, 2014
- Control Theory and Privacy, 2014, Part 1
- Control Theory and Privacy, 2014, Part 2
- Cyber-Physical System Security and Privacy, 2014, Part 1
- Cyber-Physical System Security and Privacy, 2014, Part 2
- Differential Privacy, 2014, Part 1
- Differential Privacy, 2014, Part 2
- Game Theoretic Security, 2014
- Measurement and Metrics: Testing, 2014
- Polymorphic Worms, 2014
- Searchable Encryption, 2014
- Security Measurement and Metric Methods, 2014
- Security Scalability and Big Data, 2014
- Signature-Based Defenses, 2014
- Virtualization Privacy Auditing
- Compendium of Science of Security Articles of Interest
- Adoption of Cybersecurity Technology Workshop
- Building Secure and Resilient Software from the Start
- CMU Fields Cloud-Based Sandbox
- Computational Cybersecurity in Compromised Environments Workshop
- Improving Power Grid Cybersecurity
- Selection of Android Graphic Pattern Passwords
- SoS and Resilience for Cyber-Physical Systems Project
- Wyvern Programming Language
- Builds Secure Apps
- Upcoming Events of Interest
(ID#:15-6149)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to news@scienceofsecurity.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.