Pub Crawl #18

 

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Computing Theory and Privacy 2017  Image removed.  Image removed.  Image removed.  (all)

Getting to the Science of Security will both require and generate fresh looks at computing theory. Privacy, too, is a research area with a theoretical underpinning worth researching. The work cited here is relevant to the Science of Security community problems of human behavior, resilience, and scalability.

Computing Theory and Security Metrics 2017  Image removed.   (all)

The works cited here combine research into computing theory with research into security metrics.

Control Theory and Privacy 2017  Image removed.   Image removed.  Image removed.  (all)

Control theory offers a way to address the Science of Security hard problems of scalability, resilience, and human behavior, particularly as they relate to cyber physical systems. The research work presented here specifically addresses issues in privacy.

Control Theory and Resiliency 2017  Image removed.  Image removed.  Image removed.  (all)

Control theory offers a way to address the Science of Security hard problems of scalability, resilience, and human behavior, particularly as they relate to cyber physical systems. The work cited here focuses on resiliency.

Control Theory and Security 2017  Image removed.   Image removed.  Image removed.  (all)

In the Science of Security, control theory offers methods and approaches to potentially solve hard problems in resiliency. The research work presented here broadly addresses issues in security, touching on the Science of Security hard problems of resiliency, scalability, and human factors.

Controller Area Network Security 2017   Image removed.    (all)

Controller area networks connect the main electrical units in automobiles. They are relevant to the Science of Security because of their relationship to cyber-physical systems, resiliency, and the internet of Things.

CPS Modeling and Simulation 2017  Image removed.   Image removed.  Image removed.    (all)

Modeling and simulation of Cyber-physical systems is a way to develop resiliency, composability, and predictive metrics in a laboratory environment and then test against their algorithms against real world situations. The challenge, of course, is to develop models and simulations that are accurate and reliable.

CPS Privacy 2017   Image removed.  (all)

The research work cited here looks at the Science of Security hard problem of human factors and privacy in the context of cyber physical systems.

CPS Resilience 2017    Image removed.    (all)

The research work cited here looks at the Science of Security hard problem of Resiliency in the context of cyber physical systems.

Damage Assessment 2017    Image removed.   (all)

The ability to assess damage accurately and quickly is critical to resilience.

Dark Web 2017   Image removed.  (all)

The Dark Web, or Darknet, is a subset of the deep web that is not indexed and requires something special to access it. Much of the activity on it is extra- or illegal, pornographic, or otherwise unseemly. For the Science of Security community, understanding of the activities on the Dark Web related to human behavior issues.

Data Deletion 2017  Image removed.    (all)

Data deletion has many implications for security and for data structures. For the Science of Security community, the problem has implications for privacy and scalability.

Data Sanitization 2017   Image removed.   Image removed.  Image removed.  (all)

For security researchers, privacy protection during data mining is a major concern. Sharing information over the Internet or holding it in a database requires methods of sanitizing data so that personal information cannot be obtained. For the Science of Security community, this work is relevant to human behavior and privacy, resilience, and compositionality.

Deep Packet Inspection 2017   Image removed.   Image removed.    (all)

Deep Packet Inspection offers providers a new range of use cases, some with the potential to eavesdrop on non-public communication. Current research is almost exclusively concerned with raising the capability on a technological level, but critics question it with regard to privacy, net neutrality, and other implications. These latter issues are not being raised within research communities as much as by politically interested groups. For the Science of Security community, it is relevant to scalability and resilience.

Deterrence 2017  Image removed.  Image removed.  Image removed.  (all)

Finding ways both technical and behavioral to provide disincentives to threats is a promising area of research. Since most cybersecurity is “bolt on” rather than embedded, and since detection, response, and forensics are expensive, time-consuming processes, discouraging attacks can be a cost-effective cybersecurity approach. The topic is relevant to the Science of Security hard problems of human behavior, scalability, and resilience.

 

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on