Pub Crawl #74

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Channel Coding 2022  Image removed.    Image removed.  Image removed.     (all)

Channel coding, also known as Forward Error Correction, are methods for controlling errors in data transmissions over noisy or unreliable communications channels. For cybersecurity, these methods can also be used to ensure data integrity, as some of the research cited below shows. The work cited here relates to the Science of Security problems of metrics, resiliency, and composability.

Chaotic Cryptography 2022  Image removed.    Image removed.  Image removed.     (all)

Chaos-based cryptography systems are gaining interest as a way to provide robust protection, especially against statistical attacks. For the Science of Security community, this approach is related to the hard problems of scalability, resilience, metrics.

Clean Slate 2022    Image removed.  Image removed.  Image removed.  Image removed.   (all)

The “clean slate” approach looks at designing networks and internets from scratch, with security built in, in contrast to the evolved Internet in place. The research presented here covers a range of research topics and includes items of interest to the Science of Security, including human behavior, resilience, metrics, and policy governance.

CPS and Privacy 2022          Image removed.   (all)

The research work cited here looks at the Science of Security hard problem of human factors and privacy in the context of cyber physical systems.

CPS and Resiliency 2022        Image removed.     (all)

The research work cited here looks at the Science of Security hard problem of Resiliency in the context of cyber physical systems.

CPS Security 2022  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.   (all)

The research work cited here looks at the general Science of Security hard problem of security in the context of cyber physical systems.

Cross Layer Security 2022  Image removed.      Image removed.     (all)

Protocol architectures traditionally followed strict layering principles to ensure interoperability, rapid deployment, and efficient implementation. But a lack of coordination between layers limits the performance of these architectures. More important, the lack of coordination may introduce security vulnerabilities and potential threat vectors. For the Science of Security community, this work is relevant to the problems of resiliency and composability.

Cyber Dependencies 2022  Image removed.    Image removed.  Image removed.  Image removed.   (all)

Physical systems, particularly critical infrastructure, are increasingly dependent upon cyber systems. Risks to those cyber systems create potential adverse consequences for the physical systems. Research exploring these problems is growing and is of interest to the Science of Security community relative to the hard problems of compositionality and scalability, human factors, resiliency, and metrics.

Cybersecurity Damage Assessment 2022        Image removed.     (all)

The ability to assess damage accurately and quickly is critical to resilience.

Cybersecurity Education 2022  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.   (all)

As a discipline in higher education, cybersecurity is less than two decades old. But because of the large number of qualified professionals needed, many universities offer cybersecurity education in a variety of delivery formats—live, online, and hybrid. To date, much of the curriculum has been driven by NSTISSI standards written in the early 1990s. The articles cited here look at aspects of curriculum, methods, evaluation, and support technologies. For the Science of Security community, these items are relevant to the areas of hard problems, privacy and cyber-physical systems.

Dark Web 2022          Image removed.   (all)

The Dark Web, or Darknet, is a subset of the deep web that is not indexed and requires something special to access it. Much of the activity on it is extra- or illegal, pornographic, or otherwise unseemly. For the Science of Security community, understanding of the activities on the Dark Web related to human behavior issues.

Data Deletion 2022  Image removed.           (all)

Data deletion has many implications for security and for data structures. For the Science of Security community, the problem has implications for privacy and scalability.

Data Sanitization 2022  Image removed.      Image removed.  Image removed.   (all)

For security researchers, privacy protection during data mining is a major concern. Sharing information over the Internet or holding it in a database requires methods of sanitizing data so that personal information cannot be obtained. For the Science of Security community, this work is relevant to human behavior and privacy, resilience, and compositionality.

DDOS Attack Detection 2022  Image removed.    Image removed.  Image removed.  Image removed.   (all)

Distributed Denial of Service Attacks continue to be among the most prolific forms of attack against information systems. Detection is a key step in dealing the problem. For the Science of Security community, this research is related to the problems of resilience, composability, metrics, and human behavior.

DDOS Attack Mitigation 2022  Image removed.    Image removed.  Image removed.  Image removed.   (all)

Distributed Denial of Service Attacks continue to be among the most prolific forms of attack against information systems. Mitigation is a key step in dealing the problem. For the Science of Security community, this research is related to the problems of resilience, composability, metrics, and human behavior.

DDOS Attack Prevention 2022  Image removed.    Image removed.  Image removed.  Image removed.   (all)

Distributed Denial of Service Attacks continue to be among the most prolific forms of attack against information systems. Prevention is the first step in dealing the problem. For the Science of Security community, this research is related to the problems of resilience, composability, metrics, and human behavior.

Decomposition 2022  Image removed.    Image removed.       (all)

Mathematical decomposition is often used to address network flows. For the Science of Security community, decomposition is a useful method of dealing with cyber physical systems issues, metrics, and compositionality.

Deep Packet Inspection 2022  Image removed.      Image removed.     (all)

Deep Packet Inspection offers providers a new range of use cases, some with the potential to eavesdrop on non-public communication. Current research is almost exclusively concerned with raising the capability on a technological level, but critics question it with regard to privacy, net neutrality, and other implications. These latter issues are not being raised within research communities as much as by politically interested groups. For the Science of Security community, it is relevant to scalability and resilience.

Deep Video 2022  Image removed.    Image removed.  Image removed.     (all)

The use of video for surveillance has created a need to be able to process very large volumes of data in very precise ways. Research into these methods is relevant to the Science of Security hard problems of scalability, resilience, and metrics.

Science of Security 2021  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.   (all)

Many more articles and research studies are appearing with “Science of Security” as a keyword. The articles cited here discuss the degree to which security is a science and various issues surrounding its development, ranging from basic approach to essential elements. The articles cited here address the fundamental concepts of the Science of Security.

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on