Cyber Security

page

Visible to the public Multicore Computing Security (Update)

Multicore Security Computing (Update)

page

Visible to the public Phishing

Phishing


Phishing remains a primary method for social engineering access to computers and information. Much research work has been done in this area in recent months. The 12 works cited here present research about detection, filtering, and profiling. The first paper was presented at HOT SoS 2014, the Symposium and Bootcamp on the Science of Security (HotSoS), a research event centered on the Science of Security held April 8-9, 2014 in Raleigh, North Carolina.

page

Visible to the public Oscillating Behavior

Oscillating Behaviors


The three articles cited here examine oscillating circuits. The first paper was presented at HOT SoS 2014, the Symposium and Bootcamp on the Science of Security (HotSoS), a research event centered on the Science of Security held April 8-9, 2014 in Raleigh, North Carolina.

page

Visible to the public Open Systems

Open Systems

page

Visible to the public Publications of Interest (2014 - Issue 3)

Publications of Interest (2014-03)


The Publications of Interest section contains bibliographical citations, abstracts if available and links on specific topics and research problems of interest to the Science of Security community.

How recent are these publications?

page

Visible to the public Science of Security (SoS) Newsletter (2014 - Issue 3)

SoS Newsletter Banner

2014 - Issue #03

page

Visible to the public Physical Layer Security

Physical Layer Security

page

Visible to the public Artificial Intelligence

Artificial Intelligence


page

Visible to the public Agents

Agents



In computer science, a software agent is a computer program that acts on behalf of a user or other program. Specific types of agents include intelligent agents, autonomous agents, distributed agents, multi-agent systems and mobile agents. Because of the variety of agents and the privileges agents have to represent the user or program, they are of significant cybersecurity community research interest.

page

Visible to the public Acoustic Fingerprints

Acoustic Fingerprints


Acoustic fingerprints can be used to identify an audio sample or quickly locate similar items in an audio database. As a security tool, fingerprints offer a modality of biometric identification of a user. Current research is exploring various aspects and applications, including the use of these fingerprints for mobile device security, antiforensics, use of image processing techniques, and client side embedding.