page
Submitted by Daniel Wolf on Wed, 09/03/2014 - 9:06am
page
Submitted by Daniel Wolf on Mon, 09/01/2014 - 5:23pm
Phishing remains a primary method for social engineering access to computers and information. Much research work has been done in this area in recent months. The 12 works cited here present research about detection, filtering, and profiling. The first paper was presented at HOT SoS 2014, the Symposium and Bootcamp on the Science of Security (HotSoS), a research event centered on the Science of Security held April 8-9, 2014 in Raleigh, North Carolina.
page
Submitted by Daniel Wolf on Mon, 09/01/2014 - 5:18pm
The three articles cited here examine oscillating circuits. The first paper was presented at HOT SoS 2014, the Symposium and Bootcamp on the Science of Security (HotSoS), a research event centered on the Science of Security held April 8-9, 2014 in Raleigh, North Carolina.
page
Submitted by Daniel Wolf on Mon, 09/01/2014 - 4:48pm
page
Submitted by Daniel Wolf on Mon, 09/01/2014 - 3:15pm
The Publications of Interest section contains bibliographical citations, abstracts if available and links on specific topics and research problems of interest to the Science of Security community.
How recent are these publications?
page
Submitted by Daniel Wolf on Mon, 08/25/2014 - 3:21pm
2014 - Issue #03
page
Submitted by Daniel Wolf on Sat, 08/09/2014 - 5:26pm
page
Submitted by Daniel Wolf on Wed, 07/30/2014 - 7:12am
page
Submitted by Daniel Wolf on Wed, 07/30/2014 - 7:05am
In computer science, a software agent is a computer program that acts on behalf of a user or other program. Specific types of agents include intelligent agents, autonomous agents, distributed agents, multi-agent systems and mobile agents. Because of the variety of agents and the privileges agents have to represent the user or program, they are of significant cybersecurity community research interest.
page
Submitted by Daniel Wolf on Wed, 07/30/2014 - 7:02am
Acoustic fingerprints can be used to identify an audio sample or quickly locate similar items in an audio database. As a security tool, fingerprints offer a modality of biometric identification of a user. Current research is exploring various aspects and applications, including the use of these fingerprints for mobile device security, antiforensics, use of image processing techniques, and client side embedding.