Science of Security (SoS) Newsletters
The SoS newsletters showcase research programs of interest to the Science of Security Community (SoS). All of these materials are based on open sources and in many cases link to the original work or to the web page for a specific program. There is a great deal of good work going on in this community, and this page is a way to share information about colleagues, research projects, and opportunities.
Table of Contents
Science of Security (SoS) Newsletter (2016 - Issue 4)
- Cyber Scene
- Hot Research in Cybersecurity Fuels HotSoS 2016
- Hot SoS 2016 Papers, Posters, and Tutorials
- In the News
- Publications of Interest
- Acoustic Fingerprints 2015
- Automated Response Actions 2015
- Compiler Security 2015
- Cross Layer Security 2015
- Data in Motion and Data at Rest 2015
- Data Sanitization 2015
- DNA Cryptography 2015
- Elliptic Curve Cryptography 2015
- Homomorphism 2015
- Identity Management 2015
- Immersive Systems 2015
- Information Theoretic Security 2015
- Integrity of Outsourced Databases 2015
- Intellectual Property Protection 2015
- Moving Target Defense 2015
- Natural Language Processing 2015
- Network Reconnaissance 2015
- Network Security Architecture and Resilience 2015
- Pervasive Computing 2015
- Quick Response (QR) Code 2015
- Upcoming Events of Interest
Science of Security (SoS) Newsletter (2016 - Issue 3)
- In the News
- Publications of Interest
- Autonomic Security 2015
- Botnets 2015
- CAPTCHAs 2015
- Cognitive Radio Security 2015
- Covert Channels 2015
- Cryptanalysis 2015
- Cyber-crime Analysis 2015
- Data Deletion and “Forgetting” 2015
- Hard Problems: Policy-based Security Governance 2015
- Hard Problems: Predictive Metrics 2015
- Hard Problems: Resilient Security Architectures 2015
- Hard Problems: Scalability and Composability 2015
- Hash Algorithms 2015
- Human Trust 2015
- Insider Threats 2015
- Internet of Things Security 2015
- Intrusion Tolerance 2015
- Policy Analysis 2015
- Power Grid Vulnerability Analysis 2015
- Provenance 2015
- Upcoming Events of Interest
- In the News
- International Security Related Conferences
- Publications of Interest
- Keystroke Analysis 2015
- Metadata Discovery Problem 2015
- Oscillating Behavior 2015
- Radio Frequency Identification (RFIDs) 2015
- Scientific Computing 2015
- Signal Processing 2015
- Smart Grid Security 2015
- System Recovery 2015
- Video Surveillance 2015
- Vulnerability Detection 2015
- Web Browser Security 2015
- Wireless Mesh Network Security 2015
- Upcoming Events of Interest
- In the News
- Lablet Quarterly Meeting at NCSU, Feb 2–3, 2016
- Publications of Interest
- Actuator Security 2015
- Artificial Neural Networks and Security 2015
- Channel Coding 2015
- Cybersecurity Education 2015
- Flow Control Integrity 2015
- Middleware Security 2015
- Quantum Computing Security 2015
- Safe Coding Guidelines 2015
- Sandboxing 2015
- Sandboxing for Mobile Apps 2015
- Tamper Resistance 2015
- Text Analytics 2015
- Time-Frequency Analysis and Security 2015
- Trusted Platform Modules 2015
- Upcoming Events of Interest
- International Security Related Conferences
- Publications of Interest
- Asymmetric Encryption 2015
- Digital Signatures and Privacy 2015
- Efficient Encryption 2015
- Embedded System Security 2015
- Expert Systems Security 2015
- Facial Recognition 2015
- Forward Error Correction 2015
- Fuzzy Logic and Security 2015
- Hardware Trojan Horse Detection 2015
- Honey Pots 2015
- Host-based IDS 2015
- Resilience Indicators 2015
- Resilience Metrics 2015
- Security by Default 2015
- SQL Injections 2015
- Theoretical Cryptography 2015
- Visible Light Communications Security 2015
- Weaknesses 2015
- Work Factor Metrics 2015
- Cybersecurity for the Internet of Things (IoT)
- International Security Related Conferences
- International Conferences: Advance Computing Conference (IACC) India 2015
- International Conferences: Advanced Information Networking and Applications (AINA) 2015
- International Conferences: Asia JCIS 2015, Taiwan
- International Conferences: ICCPS 2015, Seattle
- International Conferences: PST 2015, Izmir, Turkey
- Publications of Interest
- Adaptive Filtering 2015
- Agents 2015
- Anonymity and Privacy
- Clean Slate 2015
- Compressive Sampling 2015
- Computational Intelligence 2015
- Confinement 2015
- Cyber-Physical Security Expert Systems 2015
- Deep Packet Inspection, 2014
- Discrete and Continuous Optimization 2015
- Edge Detection and Metrics 2015
- Edge Detection and Security 2015
- Lightweight Ciphers 2015
- Machine Learning 2015
- Protocol Verification 2015
- Steganography 2015
- Swarm Intelligence Security 2015
- Web Caching 2015
- SoS Lablet Quarterly Meeting - Synopses of Research Presentations
- SoS Lablet Quarterly Meeting - UMD, October 2015
- 3rd Annual Best Scientific Cybersecurity Paper Competition
- In the News
- International Security Related Conferences
- International Conferences: Chinese Control and Decision Conference (CCDC), Qingdao, China, 2015
- International Conferences: CYBCONF 2015, Poland
- International Conferences: CyberSA 2015, London
- International Conferences: IBCAST 2015, Islamabad
- International Conferences: Incident Management and Forensics (IMF), Germany, 2015
- International Conferences: INFOCOM 2015, Kowloon, Hong Kong, China
- International Conferences: NSysS 2015, Bangladesh
- Publications of Interest
- Adversary Models and Privacy, 2014
- Biometric Encryption and Privacy, 2014
- Compositional Security, 2014
- Consumer Privacy in the Smart Grid, 2014
- Encryption Audits, 2014
- Homomorphism, 2014
- I/O Systems Security, 2014
- Information Flow Analysis and Security, 2014
- Location Privacy—Authentication Approaches, 2014
- Location Privacy—Cloaking-based Approaches, 2014
- MANET Security and Privacy, 2014
- PKI Trust Models, 2014
- Router System Security, 2014
- Software Assurance, 2014 Part 1
- Software Assurance, 2014, Part 2
- Taint Analysis, 2014
- Zero Day Exploits, Part 1
- Zero Day Exploits, Part 2
- Upcoming Events of Interest (2015 - Issue 8)
- In the News
- International Security Related Conferences
- International Conferences: Conference on Information Science and Control Engineering (ICISCE), Shanghai, China
- International Conferences: Cyber and Information Security Research, Oak Ridge, TN
- International Conferences: Electronic Crime Research (eCrime) 2015, Spain
- International Conferences: Information Hiding & Multimedia Security, 2015, Portland, Oregon
- International Conferences: Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)
- International Conferences: SIGMETRICS ’15, Portland Oregon
- Publications of Interest
- Attack Graphs and Privacy, 2014
- Big Data Security Metrics, 2014&
- Coding Theory and Security, 2014, Part 1
- Coding Theory and Security, 2014, Part 2
- Coding Theory and Security, 2014, Part 3
- Computing Theory and Composability, 2014
- Computing Theory and Security Metrics, 2014
- Computing Theory and Security Resilience, 2014
- Control Theory and Privacy, 2014, Part 1
- Control Theory and Privacy, 2014, Part 2
- Cyber-Physical System Security and Privacy, 2014, Part 1
- Cyber-Physical System Security and Privacy, 2014, Part 2
- Differential Privacy, 2014, Part 1
- Differential Privacy, 2014, Part 2
- Game Theoretic Security, 2014
- Measurement and Metrics: Testing, 2014
- Polymorphic Worms, 2014
- Searchable Encryption, 2014
- Security Measurement and Metric Methods, 2014
- Security Scalability and Big Data, 2014
- Signature-Based Defenses, 2014
- Virtualization Privacy Auditing
- Compendium of Science of Security Articles of Interest
- Adoption of Cybersecurity Technology Workshop
- Building Secure and Resilient Software from the Start
- CMU Fields Cloud-Based Sandbox
- Computational Cybersecurity in Compromised Environments Workshop
- Improving Power Grid Cybersecurity
- Selection of Android Graphic Pattern Passwords
- SoS and Resilience for Cyber-Physical Systems Project
- Wyvern Programming Language
- Builds Secure Apps
- Upcoming Events of Interest
- In the News
- International Security Related Conferences
- ??International Conference: Online Social Networks, 2014, Dublin, Ireland
- International Conferences: ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS) 2015, Singapore
- International Conferences: Workshop on IoT Privacy, Trust, and Security, 2015, Singapore
- International Conferences: EuroSec 15, Bordeaux, France
- International Conferences: Human Computer Interaction (CHI 15), Korea
- International Conferences: The Third International Conference on Computer, Communication, Control and Information Technology (C3IT), 2015, India
- Lablet Presentations—Quarterly Lablet Meeting at CMU, July 2015
- Panel Presentations—Quarterly Lablet Meeting at CMU, July 2015
- Paper Presentations—Quarterly Lablet Meeting at CMU, July 2015
- Publications of Interest
- Analogical Transfer, 2014
- Artificial Intelligence and Privacy, 2014
- Computing Theory and Privacy, 2014
- Data Deletion, 2014
- DNA Cryptography, 2014
- Dynamical Systems, 2014
- End to End Security and IPv6, 2014
- End to End Security and the Internet of Things, 2014
- Fog Computing Security Measurement of Security Weaknesses, 2014
- Multicore Computing and Security, 2014
- Open Systems and Security, 2014
- Pattern Locks, 2014
- Peer to Peer Security, 2014
- Privacy Models, 2014
- Privacy Models, 2015
- Resiliency and Security, 2014
- Threat Vector Metrics and Privacy, 2014
- Trust and Trustworthiness, 2014
- User Privacy in the Cloud, 2014
- Virtual Machines, 2015
- Upcoming Events of Interest
- In the News (2015 - Issue 5)
- International Security Related Conferences (2015 - Issue 5)
- International Conferences: Software Analysis, Evolution and Reengineering (SANER) Quebec, Canada
- International Conferences: Cloud Engineering (IC2E), 2015 Arizona
- International Conferences: CODASPY 15, San Antonio, Texas
- International Conferences: Cryptography and Security in Computing Systems, 2015, Amsterdam
- International Conferences: Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2015 Singapore
- International Conferences: Software Testing, Verification and Validation Workshops (ICSTW), Graz, Austria
- International Conferences: Workshop on Security and Privacy Analytics (IWSPA) ’15, San Antonio, Texas
- Publications of Interest (2015 - Issue 5)
- Cryptology and Data Security, 2014
- Deterrence
- Deterrence, 2014 (ACM Publications)
- Elliptic Curve Cryptography from ACM, 2014, Part 1
- Elliptic Curve Cryptography from ACM, 2014, Part 2
- Hard Problems: Predictive Security Metrics (ACM)
- Hard Problems: Predictive Security Metrics (IEEE)
- Hard Problems: Resilient Security Architectures (ACM)
- Journal: IEEE Transactions on Information Forensics and Security, March 2015
- Malware Analysis, 2014, Part 1 (ACM)
- Malware Analysis, 2014, Part 2 (ACM)
- Malware Analysis, Part 1
- Malware Analysis, Part 2
- Malware Analysis, Part 3
- Malware Analysis, Part 4
- Malware Analysis, Part 5
- Resilient Security Architectures (IEEE)
- Smart Grid Security
- Software Security, 2014 (ACM), Part 1
- Software Security, 2014 (ACM), Part 2
- Software Security, 2014 (IEEE), Part 1
- Software Security, 2014 (IEEE), Part 2
- Trustworthy Systems, Part 1
- Trustworthy Systems, Part 2
- SoS Lablet Quarterly Meeting - CMU
- Upcoming Events of Interest (2015 - Issue 5)
- In the News (2015 - Issue 4)
- International Security Related Conferences (2015 - Issue 4)
- Cybersecurity Conference Publications, Early 2015
- International Conferences: Information Theory Workshop (ITW), 2014, Hobart, Tasmania
- International Conferences: Computer Security Applications Conference, December 2014, New Orleans, Part 1
- International Conferences: Computer Security Applications Conference, December 2014, New Orleans, Part 2
- International Conferences: Information Networking (ICOIN), 2015, Cambodia
- International Conferences: Innovations in Theoretical Computer Science, Israel, 2015
- International Conferences: Signal Processing and Integrated Networks (SPIN), 2015
- International Conferences: Signal Processing, Informatics, Communication & Energy Systems (SPICES), India, 2015
- Security Conference Publications, Early 2015
- Publications of Interest (2015 - Issue 4)
- Citations for Hard Problems (2014 Year in Review)
- Elliptic Curve Cryptography (2014 Year in Review), Part 1
- Elliptic Curve Cryptography (2014 Year in Review), Part 2
- Elliptic Curve Cryptography (2014 Year in Review), Part 3
- Elliptic Curve Cryptography (2014 Year in Review), Part 4
- Elliptic Curve Cryptography (2014 Year in Review), Part 5
- Hard Problems: Scalability and Composability (2014 Year in Review)
- Insider Threats (2014 Year in Review)
- Internet of Things Security Problems
- Operating Systems Security (2014 Year in Review), Part 1
- Operating Systems Security (2014 Year in Review), Part 2
- Operating Systems Security (2014 Year in Review), Part 3
- Phishing (ACM) (2014 Year in Review)
- Phishing (IEEE) (2014 Year in Review), Part 1
- Phishing (IEEE) (2014 Year in Review), Part 2
- Quantum Computing Security (2014 Year in Review)
- Vulnerability Detection (2014 Year in Review), Part 1
- Vulnerability Detection (2014 Year in Review), Part 2
- Vulnerability Detection (2014 Year in Review), Part 3
- Vulnerability Detection (2014 Year in Review), Part 4
- Upcoming Events of Interest (2015 - Issue 4)
- HotSoS 2015 - Interest in Cybersecurity Science and Research Heats Up
- HotSoS 2015 - Research Presentations
- HotSoS 2015 - Tutorials
- International Security Related Conferences (2015 - Issue 3)
- International Conferences: Communication, Information & Computing Technology (ICCICT), 2015
- International Conferences: Conference on Networking Systems & Security (NSysS), Dhaka, Bangladesh
- International Conferences: Cryptography and Security in Computing Systems, Amsterdam, 2015
- International Conferences: Privacy and Security of Big Data, Shanghai, China, 2014
- Publications of Interest (2015 - Issue 3)
- Acoustic Fingerprints (2014 Year in Review)
- Android and iOS Encryption
- Anonymity and Privacy in Wireless Networks
- Attribution (2014 Year in Review) Part 1
- Attribution (2014 Year in Review) Part 2
- Authentication and Authorization (2014 Year in Review) Part 1
- Authentication and Authorization (2014 Year in Review) Part 2
- Automated Response Actions (2014 Year in Review)
- Big Data Security Issues (2014 Year in Review)
- Clean Slate (2014 Year in Review)
- Cross Layer Security (2014 Year in Review)
- Cross Site Scripting (2014 Year in Review)
- Moving Target Defense (2014 Year in Review)
- Science of Security (2014 Year in Review)
- Situational Awareness and Security - Part 1
- Situational Awareness and Security - Part 2
- Text Analytics Techniques (2014 Year in Review)
- SecUrity and Resilience (SURE) Review
- SURE Meeting Presentations 2015 March 17-18
- Upcoming Events of Interest (2015 - Issue 3)
- General Topics of Interest (Vol 2015 - Issue 2)
- In the News (Vol 2015 - Issue 2)
- International Security Research Conferences Conferences (Vol 2015 - Issue 2)
- International Conferences: Computer Science and Information Systems (FedCSIS), Warsaw, Poland
- International Conferences: IEEE Information Theory Workshop, Hobart, Australia
- International Conferences: IEEE Security and Privacy Workshops, San Jose, California
- International Conferences: Workshop on Visualization for Cyber Security (VizSec 2014), Paris, France
- International Conferences: IEEE World Congress on Services, Anchorage, Alaska
- International Conferences: Information Hiding and Multimedia Security Workshop, Salzburg, Austria
- International Conferences: Software Security and Reliability (SERE), San Francisco, CA
- International Conferences: Symposium on Resilient Control Systems (ISRCS)
- Publications of Interest (Vol 2015 - Issue 2)
- Actuator Security
- Communications Security
- Discrete and Continuous Optimization
- Distributed Denial of Service Attacks (DDoS Attacks)
- Host-based Intrusion Detection
- Human Trust
- Integrated Security
- Intrusion Tolerance (2014 Year in Review)
- Power Grid Security
- Software Tamper Resistance
- Theoretical Foundations for Software
- Time Frequency Analysis
- Trust and Trustworthiness
- Trusted Platform Modules (TPMs)
- Video Surveillance
- Wireless Mesh Network Security
- Lablet Activities (Vol 2015 - Issue 2)
- Upcoming Events of Interest (Vol 2015 - Issue 2)
- Science of Security (SoS) Summer Internships
- In the News
- International Security Research Conferences Conferences
- Publications of Interest
- Ad Hoc Network Security
- Adaptive Filtering
- Autonomic Security
- Botnets
- Cyber-crime Analysis
- Cybersecurity Education
- Digital Signature Security
- Hardware Trojan Horse Detection
- Hash Algorithms
- Identity Management
- Key Management
- Metadata Discovery Problem
- Middleware Security
- Multiple Fault Diagnosis
- Protocol Verification
- System Recovery
- Zero Day Attacks
- Lablet Activities
- Upcoming Events of Interest
- In the News
-
International Security Research Conferences
- 10th International Conference on Security and Privacy in Communication Networks - Beijing, China
- 15th International Conference on Information & Communications Security (ICICS 2013) - Beijing, China
- 2014 Iran Workshop on Communication and Information Theory (IWCIT) - Iran
- 6th International Conference on New Technologies, Mobility & Security (NTMS) - Dubai
- ACM CHI Conference on Human Factors in Computing Systems - Toronto, Canada
- China Summit & International Conference on Signal and Information Processing (ChinaSIP) - Xi'an, China
- Computer Communication and Informatics (ICCCI) - Coimbatore, India
- Conference on Advanced Communication Technology - Korea
- International Conferences on Service Oriented System Engineering, 2014, Oxford, U.K.
- International Conferences: Dependable Systems and Networks (2014) - USA
- International Science of Security Research: China Communications 2013
- International Science of Security Research: China Communications 2014
- Lablet Research: Human Behavior & Cybersecurity
- Publications of Interest
- Big Data
- Browser Security
- CAPTCHA
- Channel Coding
- Clean Slate
- Cloud Security
- Coding Theory
- Cognitive Radio Security
- Compiler Security
- Compressive Sampling
- Computational Intelligence
- Confinement
- Control Theory
- Covert Channels
- Cryptanalysis
- Data at Rest - Data i Motion
- Edge Detection
- Expert Systems
- Facial Recognition
- Forward Error Correction
- Fuzzy Logic and Security
- Visible Light Communication
- Web Caching
- SoS VO Member Contributions
- General Topics of Interest
- Upcoming Events
- In the News
- Publications of Interest
- Science of Security Quarterly Lablet Meeting (UMD - Oct 2014)
- Cyber Aptitude and the Science of Intellectual Assessment
- Deploying the Security Behavior Observatory: An Infrastructure for Long-term Monitoring of Client Machines
- Developing Security Metrics
- Insights into Composibility from Lablet Research
- Remind me Tomorrow: Human Behaviors and Cyber Vulnerabilities
- Science of Secure and Resilient Cyber-Physical Systems
- Security of Networked Cyber-Physical Systems: Challenges and Some Promising Approaches
- Static Dynamic Analysis of Security Metrics for Cyber-physical Systems
- Survey on Resilience
- System Science of SecUrity and REsilience (SURE) - Kickoff Meeting
- Upcoming Events
- In the News (2014 - Final)
- Best Scientific Cybersecurity Paper
- General Topics of Interest
- Publications of Interest
- SoS Lablet Publications
- In the News (2014 - Issue 3)
- Publications of Interest (2014 - Issue 3)
- Cyber-physical Systems Security
- Data Sanitization
- Embedded System Security
- Honeypots
- Internet of Things (Part 1)
- Multicore Computing Security (Update)
- Open Systems
- Oscillating Behavior
- Phishing
- Quantum Computing (Update)
- Safe Coding
- Secure File Sharing
- Swarm Intelligence Security
- Theoretical Cryptography
- Threat Vectors
- Virtual Machines
- Spotlight on Current Lablet Activities
- Upcoming Events of Interest (2014 - Issue 3)
- In the News (2014-02)
- Publications of Interest
- Acoustic Fingerprints
- Agents
- Analogical Transfer
- Artificial Intelligence
- Computer Science as a Theoretical Science
- Cross Layer Security
- Cross Site Scripting
- Data Deletion and Forgetting
- Dynamical Systems
- Effectiveness and Work Factor Metrics
- Human Factors
- Information Theoretic Security
- Neural Networks
- Physical Layer Security
- Radio Frequency Identification
- Risk Estimations
- Scientific Computing
- SQL Injections
- Text Analytics
- Weaknesses
- General Topics of Interest
- In the News
- Academic SoS Research Highlights
- Academic SoS Research Programs
- Cooperative SoS Activities
- Interdisciplinary SoS Activities
- Meet the Leaders in SoS Research
- Meet the SoS Research Lablets
- SoS Academic Survey
- Spotlight on Research Activities Outside of the US
- Publications of Interest
- Authentication and Authorization
- Automated Response Actions
- Computer Science
- Cryptography and Security
- Cyber-Physical Systems
- Dynamic Execution
- End to End Computing
- Game Theoretic Approaches
- Intrusion Tolerance
- IPv6 and Other Protocols
- Mathematics
- Mobile Computing
- Mobile Computing and Security
- Moving Target Defense
- Operating Systems
- Peer to Peer Systems
- Quantum Computing
- Resiliency
- Signals Processing
- Situational Awareness
- Software Assurance
- Virtual Machines
- Recent NSF Research Grants 2012-2013
- Research Grant Opportunities
- Upcoming Events of Interest
Science of Security (SoS) Newsletter (2016 - Issue 2)
Science of Security (SoS) Newsletter (2016 - Issue 1)
Science of Security (SoS) Newsletter (2015 - Issue 10)
Science of Security (SoS) Newsletter (2015 - Issue 9)
Science of Security (SoS) Newsletter (2015 - Issue 8)
Science of Security (SoS) Newsletter (2015 - Issue 7)
Science of Security (SoS) Newsletter (2015 - Issue 6)
Science of Security (SoS) Newsletter (2015 - Issue 5)
Science of Security (SoS) Newsletter (2015 - Issue 4)
Science of Security (SoS) Newsletter (2015 - Issue 3)
Science of Security (SoS) Newsletter (Vol 2015 - Issue 2)
Science of Security (SoS) Newsletter (Vol 2015 - Issue 1)
Science of Security (SoS) Newsletter (Vol 2014 - Issue 6)
Science of Security (SoS) Newsletter (Vol 2014 - Issue 5)
Science of Security (SoS) Newsletter (Vol 2014 - Issue 4)
Science of Security (SoS) Newsletter (Vol 2014 - Issue 3)
Science of Security (SoS) Newsletter (Vol 2014 - Issue 2)
Science of Security (SoS) Newsletter (Vol 2014 - Issue 1)
(ID#:14-1544)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.