Publications of Interest
SoS Newsletter- Advanced Book Block
- Science of Security (SoS) Newsletter
- Index of Newsletter Topics
- Science of Security (SoS) Newsletter (2016 - Issue 8)
- Cyber Scene #4
- In the News 2016 - Issue 8
- Publications of Interest
- APIs 2015 (Part 1)
- APIs 2015 (Part 2)
- Cryptography with Photons 2015
- Data Race Vulnerabilities 2015
- Dynamical Systems 2015
- Effectiveness and Work Factor Metrics 2015 – 2016 (Part 1)
- Effectiveness and Work Factor Metrics 2015 – 2016 (Part 2)
- End to End Security and the Internet of Things 2015
- Expandability 2015
- Fog Computing Security 2015
- Integrated Security Technologies in Cyber-Physical Systems 2015
- Kerberos 2015
- Location-Based Services 2015
- Magnetic Remanence 2015
- Multicore Computing Security 2015
- Network Layer Security for the Smart Grid 2015
- Routing Anomalies 2015
- Sybil Attacks 2015
- Trust and Trustworthiness 2015 (Part 1)
- Trust and Trustworthiness 2015 (Part 2)
- SoS Lablet Quarterly Meeting at Urbana-Champaign, July 26–27, 2016
- Upcoming Events of Interest 2016 - Issue 8
- Science of Security (SoS) Newsletter (2016 - Issue 7)
- In the News 2016 - Issue 7
- Publications of Interest
- 6LoWPAN 2015
- Anonymity in Wireless Networks 2015
- Attribution 2015
- Authentication & Authorization with Privacy, 2015, (Part 1)
- Authentication and Authorization with Privacy, 2015, (Part 2)
- Big Data Security Issues in the Cloud 2015
- Coding Theory and Security 2015
- Cyber Physical Systems and Metrics 2015
- Cyber Physical Systems and Privacy 2015
- Cyber Physical Systems Resiliency 2015
- Decomposition and Security 2015
- Deterrence 2015
- Dynamic Network Services and Security 2015
- Game Theoretic Security 2015
- Hard Problems: Human Behavior and Security 2015 (Part 2)
- Hard Problems: Human Behavior and Security 2015 (Part 1)
- Hard Problems: Security Metrics 2015
- Location Privacy in Wireless Networks 2015
- Multidimensional Signal Processing 2015 (Part 1)
- Multidimensional Signal Processing 2015 (Part 2)
- Resiliency 2015
- Upcoming Events of Interest 2016 - Issue 7
- Science of Security (SoS) Newsletter (2016 - Issue 6)
- Cyber Scene #3
- In the News
- Publications of Interest
- Android Encryption 2015
- Black Box Cryptography 2015
- Command Injection Attacks
- False Data Injection Attacks 2015
- Information Forensics and Security 2015
- iOS Encryption
- IPv6 Security 2015
- Network Accountability 2015
- Network Coding 2015
- Network Intrusion Detection 2015
- Networked Control Systems 2015
- Peer to Peer 2015
- Phishing 2015
- Physical Layer Security 2015
- Pollution Attacks 2015
- Ransomware
- Secure File Sharing 2015
- Self-healing Networks 2015
- Virtual Machines 2015
- White Box Cryptography
- SoS Software-Defined Networking Presentations
- SoS Software-Defined Networking Workshop
- Upcoming Events of Interest
- Science of Security (SoS) Newsletter (2016 - Issue 5)
- Cyber Scene #2
- In the News
- Publications of Interest
- Composability 2015
- Cross Site Scripting 2015
- Cryptography and Data Security 2015
- Distributed Denial of Service Attack Detection 2015
- Distributed Denial of Service Attack Mitigation 2015
- Distributed Denial of Service Attack Prevention 2015
- Internet of Vehicles 2015
- Key Management 2015
- Language Based Security 2015
- Locking 2015
- Microelectronics Security 2015
- Multicore Computing Security 2015
- Multifactor Authentication 2015
- Multiple Fault Diagnosis 2015
- Neural Networks 2015
- Operating System Security 2015
- Risk Estimation 2015
- Searchable Encryption 2015
- Situational Awareness 2015
- Software Assurance 2015
- Trustworthy Systems 2015
- Upcoming Events of Interest
- Science of Security (SoS) Newsletter (2016 - Issue 4)
- Cyber Scene #1
- Hot Research in Cybersecurity Fuels HotSoS 2016
- Hot SoS 2016 Papers, Posters, and Tutorials
- In the News
- Publications of Interest
- Acoustic Fingerprints 2015
- Automated Response Actions 2015
- Compiler Security 2015
- Cross Layer Security 2015
- Data in Motion and Data at Rest 2015
- Data Sanitization 2015
- DNA Cryptography 2015
- Elliptic Curve Cryptography 2015
- Identity Management 2015
- Immersive Systems 2015
- Information Theoretic Security 2015
- Integrity of Outsourced Databases 2015
- Intellectual Property Protection 2015
- Network Reconnaissance 2015
- Network Security Architecture and Resilience 2015
- Quick Response (QR) Code 2015
- Upcoming Events of Interest
- Science of Security (SoS) Newsletter (2016 - Issue 3)
- In the News
- Publications of Interest
- Autonomic Security 2015
- Botnets 2015
- CAPTCHAs 2015
- Cognitive Radio Security 2015
- Covert Channels 2015
- Cryptanalysis 2015
- Cyber-crime Analysis 2015
- Data Deletion and “Forgetting” 2015
- Hard Problems: Policy-based Security Governance 2015
- Hard Problems: Predictive Metrics 2015
- Hard Problems: Resilient Security Architectures 2015
- Hard Problems: Scalability and Composability 2015
- Hash Algorithms 2015
- Human Trust 2015
- Insider Threats 2015
- Internet of Things Security 2015
- Intrusion Tolerance 2015
- Policy Analysis 2015
- Power Grid Vulnerability Analysis 2015
- Provenance 2015
- Upcoming Events of Interest
- Science of Security (SoS) Newsletter (2016 - Issue 2)
- In the News
- International Security Related Conferences
- International Conference: Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) 2015, Shanghai, China
- International Conferences: Communications and Signal Processing (ICCSP), India 2015
- International Conferences: Computing and Communications Technologies (ICCCT'15), Chennai, India 2015
- Publications of Interest
- Keystroke Analysis 2015
- Metadata Discovery Problem 2015
- Oscillating Behavior 2015
- Radio Frequency Identification (RFIDs) 2015
- Scientific Computing 2015
- Signal Processing 2015
- Smart Grid Security 2015
- System Recovery 2015
- Video Surveillance 2015
- Vulnerability Detection 2015
- Web Browser Security 2015
- Wireless Mesh Network Security 2015
- Upcoming Events of Interest
- Science of Security (SoS) Newsletter (2016 - Issue 1)
- In the News
- Lablet Quarterly Meeting at NCSU, Feb 2–3, 2016
- Publications of Interest
- Actuator Security 2015
- Artificial Neural Networks and Security 2015
- Channel Coding 2015
- Cybersecurity Education 2015
- Flow Control Integrity 2015
- Middleware Security 2015
- Quantum Computing Security 2015
- Safe Coding Guidelines 2015
- Sandboxing 2015
- Sandboxing for Mobile Apps 2015
- Tamper Resistance 2015
- Text Analytics 2015
- Time-Frequency Analysis and Security 2015
- Trusted Platform Modules 2015
- Upcoming Events of Interest
- Science of Security (SoS) Newsletter (2015 - Issue 10)
- International Security Related Conferences
- Publications of Interest
- Asymmetric Encryption 2015
- Digital Signatures and Privacy 2015
- Efficient Encryption 2015
- Embedded System Security 2015
- Expert Systems Security 2015
- Facial Recognition 2015
- Forward Error Correction 2015
- Fuzzy Logic and Security 2015
- Hardware Trojan Horse Detection 2015
- Honey Pots 2015
- Host-based IDS 2015
- Resilience Indicators 2015
- Resilience Metrics 2015
- Security by Default 2015
- SQL Injections 2015
- Theoretical Cryptography 2015
- Visible Light Communications Security 2015
- Weaknesses 2015
- Work Factor Metrics 2015
- Science of Security (SoS) Newsletter (2015 - Issue 9)
- 3rd Annual Best Scientific Cybersecurity Paper Competition Awards Ceremony
- Cybersecurity for the Internet of Things (IoT)
- International Security Related Conferences
- Publications of Interest
- Adaptive Filtering 2015
- Agents 2015
- Anonymity and Privacy 2015
- Clean Slate 2015
- Compressive Sampling 2015
- Computational Intelligence 2015
- Confinement 2015
- Cyber-Physical Security Expert Systems 2015
- Deep Packet Inspection 2014
- Discrete and Continuous Optimization 2015
- Edge Detection and Metrics 2015
- Edge Detection and Security 2015
- Lightweight Ciphers 2015
- Machine Learning 2015
- Protocol Verification 2015
- Steganography 2015
- Swarm Intelligence Security 2015
- Web Caching 2015
- SoS Lablet Quarterly Meeting - Synopses of Research Presentations
- SoS Lablet Quarterly Meeting - UMD, October 2015
- SURE Meets, Reports on 2015 Work on Resiliency
- Science of Security (SoS) Newsletter (2015 - Issue 8)
- 3rd Annual Best Scientific Cybersecurity Paper Competition
- In the News
- International Security Related Conferences
- International Conferences: Chinese Control and Decision Conference (CCDC), Qingdao, China, 2015
- International Conferences: CYBCONF 2015, Poland
- International Conferences: CyberSA 2015, London
- International Conferences: IBCAST 2015, Islamabad
- International Conferences: Incident Management and Forensics (IMF), Germany, 2015
- International Conferences: INFOCOM 2015, Kowloon, Hong Kong, China
- International Conferences: NSysS 2015, Bangladesh
- Publications of Interest
- Adversary Models and Privacy, 2014
- Biometric Encryption and Privacy, 2014
- Compositional Security, 2014
- Consumer Privacy in the Smart Grid, 2014
- Encryption Audits, 2014
- Homomorphism, 2014
- I/O Systems Security, 2014
- Information Flow Analysis and Security, 2014
- Location Privacy—Authentication Approaches, 2014
- Location Privacy—Cloaking-Based Approaches, 2014
- MANET Security and Privacy, 2014
- PKI Trust Models, 2014
- Router System Security, 2014
- Software Assurance, 2014, Part 1
- Software Assurance, 2014, Part 2
- Taint Analysis, 2014
- Zero-Day Exploits, Part 1
- Zero-Day Exploits, Part 2
- Upcoming Events of Interest (2015 - Issue 8)
- Science of Security (SoS) Newsletter (2015 - Issue 7)
- In the News
- International Security Related Conferences
- International Conferences: Conference on Information Science and Control Engineering (ICISCE), Shanghai, China
- International Conferences: Cyber and Information Security Research, Oak Ridge, TN
- International Conferences: Electronic Crime Research (eCrime) 2015, Spain
- International Conferences: Information Hiding & Multimedia Security, 2015, Portland, Oregon
- International Conferences: Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)
- International Conferences: SIGMETRICS ’15, Portland Oregon
- Publications of Interest
- Attack Graphs and Privacy, 2014
- Big Data Security Metrics, 2014
- Coding Theory and Security, 2014, Part 1
- Coding Theory and Security, 2014, Part 2
- Coding Theory and Security, 2014, Part 3
- Computing Theory and Composability, 2014
- Computing Theory and Security Metrics, 2014
- Computing Theory and Security Resilience, 2014
- Control Theory and Privacy, 2014, Part 1
- Control Theory and Privacy, 2014, Part 2
- Cyber-Physical System Security and Privacy, 2014, Part 1
- Cyber-Physical System Security and Privacy, 2014, Part 2
- Differential Privacy, 2014, Part 1
- Differential Privacy, 2014, Part 2
- Game Theoretic Security, 2014
- Measurement and Metrics: Testing, 2014
- Polymorphic Worms, 2014
- Searchable Encryption, 2014
- Security Measurement and Metric Methods, 2014
- Security Scalability and Big Data, 2014
- Signature-Based Defenses, 2014
- Virtualization Privacy Auditing
- Compendium of Science of Security Articles of Interest
- Adoption of Cybersecurity Technology Workshop
- Building Secure and Resilient Software from the Start
- CMU Fields Cloud-Based Sandbox
- Computational Cybersecurity in Compromised Environments Workshop
- Improving Power Grid Cybersecurity
- Selection of Android Graphic Pattern Passwords
- SoS and Resilience for Cyber-Physical Systems Project
- Wyvern Programming Language Builds Secure Apps
- Upcoming Events of Interest
- Science of Security (SoS) Newsletter (2015 - Issue 6)
- In the News
- International Security Related Conferences
- International Conference: Online Social Networks, 2014, Dublin, Ireland
- International Conferences: ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS) 2015, Singapore
- International Conferences: Workshop on IoT Privacy, Trust, and Security, 2015, Singapore
- International Conferences: EuroSec 15, Bordeaux, France
- International Conferences: Human Computer Interaction (CHI 15), Korea
- International Conferences: The Third International Conference on Computer, Communication, Control and Information Technology (C3IT), 2015, India
- Lablet Presentations—Quarterly Lablet Meeting at CMU, July 2015
- Panel Presentations—Quarterly Lablet Meeting at CMU, July 2015
- Paper Presentations—Quarterly Lablet Meeting at CMU, July 2015
- Publications of Interest
- Analogical Transfer, 2014
- Artificial Intelligence and Privacy, 2014
- Computing Theory and Privacy, 2014
- Data Deletion, 2014
- DNA Cryptography, 2014
- Dynamical Systems, 2014
- End to End Security and IPv6, 2014
- End to End Security and the Internet of Things, 2014
- Fog Computing Security
- Measurement of Security Weaknesses, 2014
- Multicore Computing and Security, 2014
- Open Systems and Security, 2014
- Pattern Locks, 2014
- Peer to Peer Security, 2014
- Privacy Models, 2014
- Privacy Models, 2015
- Resiliency and Security, 2014
- Threat Vector Metrics and Privacy, 2014
- Trust and Trustworthiness, 2014
- User Privacy in the Cloud, 2014
- Virtual Machines, 2015
- Upcoming Events of Interest
- Science of Security (SoS) Newsletter (2015 - Issue 5)
- In the News
- International Security Related Conferences
- International Conferences: Software Analysis, Evolution and Reengineering (SANER) Quebec, Canada
- International Conferences: Cloud Engineering (IC2E), 2015 Arizona
- International Conferences: CODASPY 15, San Antonio, Texas
- International Conferences: Cryptography and Security in Computing Systems, 2015, Amsterdam
- International Conferences: Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2015 Singapore
- International Conferences: Software Testing, Verification and Validation Workshops (ICSTW), Graz, Austria
- International Conferences: Workshop on Security and Privacy Analytics (IWSPA) ’15, San Antonio, Texas
- Publications of Interest
- Cryptology and Data Security, 2014
- Deterrence
- Deterrence, 2014 (ACM Publications)
- Elliptic Curve Cryptography from ACM, 2014, Part 1
- Elliptic Curve Cryptography from ACM, 2014, Part 2
- Hard Problems: Predictive Security Metrics (ACM)
- Hard Problems: Predictive Security Metrics (IEEE)
- Hard Problems: Resilient Security Architectures (ACM)
- Journal: IEEE Transactions on Information Forensics and Security, March 2015
- Malware Analysis 2014, Part 1 (ACM)
- Malware Analysis, 2014, Part 2 (ACM)
- Malware Analysis, Part 1
- Malware Analysis, Part 2
- Malware Analysis, Part 3
- Malware Analysis, Part 4
- Malware Analysis, Part 5
- Resilient Security Architectures (IEEE)
- Smart Grid Security
- Software Security, 2014 (ACM), Part 1
- Software Security, 2014 (ACM), Part 2
- Software Security, 2014 (IEEE), Part 1
- Software Security, 2014 (IEEE), Part 2
- Trustworthy Systems, Part 1
- Trustworthy Systems, Part 2
- SoS Lablet Quarterly Meeting - CMU
- Upcoming Events of Interest
- Science of Security (SoS) Newsletter (2015 - Issue 4)
- In the News
- International Security Related Conferences
- Cybersecurity Conference Publications, Early 2015
- International Conferences: Information Theory Workshop (ITW), 2014, Hobart, Tasmania
- International Conferences: Computer Security Applications Conference, December 2014, New Orleans, Part 1
- International Conferences: Computer Security Applications Conference, December 2014, New Orleans, Part 2
- International Conferences: Information Networking (ICOIN), 2015, Cambodia
- International Conferences: Innovations in Theoretical Computer Science, Israel, 2015
- International Conferences: Signal Processing and Integrated Networks (SPIN), 2015
- International Conferences: Signal Processing, Informatics, Communication & Energy Systems (SPICES), India, 2015
- Security Conference Publications, Early 2015
- Publications of Interest
- Citations for Hard Problems (2014 Year in Review)
- Elliptic Curve Cryptography (2014 Year in Review), Part 1
- Elliptic Curve Cryptography (2014 Year in Review), Part 2
- Elliptic Curve Cryptography (2014 Year in Review), Part 3
- Elliptic Curve Cryptography (2014 Year in Review), Part 4
- Elliptic Curve Cryptography (2014 Year in Review), Part 5
- Hard Problems: Scalability and Composability (2014 Year in Review)
- Insider Threats (2014 Year in Review)
- Internet of Things Security Problems
- Operating Systems Security (2014 Year in Review), Part 1
- Operating Systems Security (2014 Year in Review), Part 2
- Operating Systems Security (2014 Year in Review), Part 3
- Phishing (ACM) (2014 Year in Review)
- Phishing (IEEE) (2014 Year in Review), Part 1
- Phishing (IEEE) (2014 Year in Review), Part 2
- Vulnerability Detection (2014 Year in Review), Part 1
- Vulnerability Detection (2014 Year in Review), Part 2
- Vulnerability Detection (2014 Year in Review), Part 3
- Vulnerability Detection (2014 Year in Review), Part 4
- Upcoming Events of Interest (2015 - Issue 4)
- Science of Security (SoS) Newsletter (2015 - Issue 3)
- HotSoS 2015 - Interest in Cybersecurity Science and Research Heats Up
- HotSoS 2015 - Research Presentations
- HotSoS 2015 - Tutorials
- International Security Related Conferences
- International Conferences: Communication, Information & Computing Technology (ICCICT), 2015
- International Conferences: Conference on Networking Systems & Security (NSysS), Dhaka, Bangladesh
- International Conferences: Cryptography and Security in Computing Systems, Amsterdam, 2015
- International Conferences: Privacy and Security of Big Data, Shanghai, China, 2014
- Publications of Interest
- Acoustic Fingerprints (2014 Year in Review)
- Android and iOS Encryption
- Anonymity and Privacy in Wireless Networks
- Attribution (2014 Year in Review) Part 1
- Attribution (2014 Year in Review) Part 2
- Authentication and Authorization (2014 Year in Review) Part 1
- Authentication and Authorization (2014 Year in Review) Part 2
- Automated Response Actions (2014 Year in Review)
- Big Data Security Issues (2014 Year in Review)
- Clean Slate (2014 Year in Review)
- Cross Layer Security (2014 Year in Review)
- Cross Site Scripting (2014 Year in Review)
- Moving Target Defense (2014 Year in Review)
- Science of Security (2014 Year in Review)
- Situational Awareness and Security - Part 1
- Situational Awareness and Security - Part 2
- Text Analytics Techniques (2014 Year in Review)
- SecUrity and Resilience (SURE) Review
- SURE Meeting Presentations 2015 March 17-18
- Upcoming Events of Interest
- Science of Security (SoS) Newsletter (2015 - Issue 2)
- General Topics of Interest
- In the News
- International Security Related Conferences
- International Conferences: Computer Science and Information Systems (FedCSIS), Warsaw, Poland
- International Conferences: IEEE Information Theory Workshop, Hobart, Australia
- International Conferences: IEEE Security and Privacy Workshops, San Jose, California
- International Conferences: Workshop on Visualization for Cyber Security (VizSec 2014), Paris, France
- International Conferences: IEEE World Congress on Services, Anchorage, Alaska
- International Conferences: Information Hiding and Multimedia Security Workshop, Salzburg, Austria
- International Conferences: Software Security and Reliability (SERE), San Francisco, CA
- International Conferences: Symposium on Resilient Control Systems (ISRCS), Denver, Colorado
- Lablet Activities
- Publications of Interest
- Actuator Security
- Communications Security
- Discrete and Continuous Optimization
- Distributed Denial of Service Attacks (DDoS Attacks)
- Host-based Intrusion Detection
- Human Trust
- Input-Output (I/O) Systems Security
- Integrated Security
- Integrity of Outsourced Databases
- Intrusion Tolerance (2014 Year in Review)
- Power Grid Security
- Software Tamper Resistance
- Theoretical Foundations for Software
- Time Frequency Analysis
- Trust and Trustworthiness
- Trusted Platform Modules (TPMs)
- Video Surveillance
- Wireless Mesh Network Security
- Upcoming Events
- Science of Security (SoS) Newsletter (2015 - Issue 1)
- Science of Security (SoS) Summer Internships
- In the News
- International Security Research Conferences
- Publications of Interest
- Ad Hoc Network Security
- Adaptive Filtering
- Autonomic Security
- Botnets
- Cyber-crime Analysis
- Cybersecurity Education
- Digital Signature Security
- Hardware Trojan Horse Detection
- Hash Algorithms
- Identity Management
- Key Management
- Metadata Discovery Problem
- Middleware Security
- Multiple Fault Diagnosis
- Protocol Verification
- System Recovery
- Zero Day Attacks
- Lablet Activities
- Upcoming Events
- Science of Security (SoS) Newsletter (2014 - Issue 6)
- In the News
- International Security Research Conferences
- 10th International Conference on Security and Privacy in Communication Networks - Beijing, China
- 15th International Conference on Information & Communications Security (ICICS 2013) - Beijing, China
- 2014 Iran Workshop on Communication and Information Theory (IWCIT) - Iran
- 6th International Conference on New Technologies, Mobility & Security (NTMS) - Dubai
- ACM CHI Conference on Human Factors in Computing Systems - Toronto, Canada
- China Summit & International Conference on Signal and Information Processing (ChinaSIP) - Xi'an, China
- Computer Communication and Informatics (ICCCI) - Coimbatore, India
- Conference on Advanced Communication Technology - Korea
- International Conferences on Service Oriented System Engineering, 2014, Oxford, U.K.
- International Conferences: Dependable Systems and Networks (2014) - USA
- International Science of Security Research: China Communications 2013
- International Science of Security Research: China Communications 2014
- Lablet Research: Human Behavior & Cybersecurity
- Publications of Interest
- Big Data
- Browser Security
- CAPTCHA
- Channel Coding
- Clean Slate
- Cloud Security
- Coding Theory
- Cognitive Radio Security
- Compiler Security
- Compressive Sampling
- Computational Intelligence
- Confinement
- Control Theory
- Covert Channels
- Cryptanalysis
- Data at Rest - Data i Motion
- Edge Detection
- Expert Systems
- Facial Recognition
- Forward Error Correction
- Fuzzy Logic and Security
- Visible Light Communication
- Web Caching
- SoS VO Member Contributions
- General Topics of Interest
- Upcoming Events
- Science of Security (SoS) Newsletter (2014 - Issue 5)
- In the News
- Publications of Interest
- Science of Security Quarterly Lablet Meeting (UMD - Oct 2014)
- Cyber Aptitude and the Science of Intellectual Assessment
- Deploying the Security Behavior Observatory: An Infrastructure for Long-term Monitoring of Client Machines
- Developing Security Metrics
- Insights into Composability from Lablet Research
- Remind me Tomorrow: Human Behaviors and Cyber Vulnerabilities
- Science of Secure and Resilient Cyber-Physical Systems
- Security of Networked Cyber-Physical Systems: Challenges and Some Promising Approaches
- Static Dynamic Analysis of Security Metrics for Cyberphysical Systems
- Survey on Resilience
- System Science of SecUrity and REsilience (SURE) - Kickoff Meeting
- Upcoming Events
- Science of Security (SoS) Newsletter (2014 - Issue 4)
- Science of Security (SoS) Newsletter (2014 - Issue 3)
- Science of Security (SoS) Newsletter (2014 - Issue 2)
- In the News (2014-02)
- Publications of Interest
- Acoustic Fingerprints
- Agents
- Analogical Transfer
- Artificial Intelligence
- Computer Science as a Theoretical Science
- Cross Layer Security
- Cross Site Scripting
- Data Deletion and Forgetting
- Dynamical Systems
- Effectiveness and Work Factor Metrics
- Human Factors
- Information Theoretic Security
- Neural Networks
- Physical Layer Security
- Radio Frequency Identification
- Risk Estimations
- Scientific Computing
- SQL Injections
- Text Analytics
- Weaknesses
- Science of Security (SoS) Newsletter (2014 - Issue 1)
- General Topics of Interest
- Publications of Interest
- Authentication and Authorization
- Automated Response Actions
- Computer Science
- Cryptography and Security
- Cyber-Physical Systems
- Dynamic Execution
- End to End Computing
- Game Theoretic Approaches
- Intrusion Tolerance
- IPv6 and Other Protocols
- Mathematics
- Mobile Computing
- Mobile Computing and Security
- Moving Target Defense
- Operating Systems
- Peer to Peer Systems
- Quantum Computing
- Resiliency
- Signals Processing
- Situational Awareness
- Software Assurance
- Virtual Machines
- Recent NSF Research Grants 2012-2013
- Research Grant Opportunities
- Upcoming Events of Interest
Publications of Interest |
The Publications of Interest section contains bibliographical citations, abstracts if available, and links on specific topics and research problems of interest to the Science of Security community.
How recent are these publications?
These bibliographies include recent scholarly research on topics which have been presented or published within the past year. Some represent updates from work presented in previous years; others are new topics.
How are topics selected?
The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness to current researchers.
How can I submit or suggest a publication?
Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.
Submissions and suggestions may be sent to: news@scienceofsecurity.net
(ID#: 15-7670)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to news@scienceofsecurity.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
- Actuator Security 2015
- Artificial Neural Networks and Security 2015
- Channel Coding 2015
- Cybersecurity Education 2015
- Flow Control Integrity 2015
- Middleware Security 2015
- Quantum Computing Security 2015
- Safe Coding Guidelines 2015
- Sandboxing 2015
- Sandboxing for Mobile Apps 2015
- Tamper Resistance 2015
- Text Analytics 2015
- Time-Frequency Analysis and Security 2015
- Trusted Platform Modules 2015