-
AFOSR Basic Research Initiative
Background: Cyberspace operations (CO) rely heavily on the degree to which users trust, or are suspicious, of their information technology systems. Computer network defense service providers hope that users will remain cognizant of threats, such as…
-
SoS Archives
The SoS Lablet Working Group was created for the purpose of planning and coordinating research and other activities in support of NSA Science of Security initiative.Science of Security Virtual Organization ChecklistLead PI or Content ManagerHome Page of…
-
Protocol Verification Group
The Protocol eXchange Workshops2016April 13- 14, 2016 (National Cryptologic Museum)2015June 22 - 23, 2015 (National Cryptologic Museum)2014September 23 - 24, 2014 (National Cryptologic Museum)January 9, 2014 (National Cryptologic Museum)…
-
Adoption of Cybersecurity Technology Working Group
Welcome to the Adoption of Cybersecurity Technology Workshop Working Group. The purpose of this group is to provide a centralized repository for meeting minutes, supporting documents, draft agendas, and other material needed to help in the…
-
SoS Lablet Reports
AnnouncementsQuarterly reports are due to the NSA on the 10th of the month following the close of the quarter. Annual reports are due 30 days after the close of the year.2017 Due DatesJanuary 10thApril 10thMay 15th (annual report covering April 2016…
-
Adoption of Cybersecurity Technology
This is an invitation only event. About the ACT 2016 Workshop The Adoption of Cybersecurity Technology Workshop is sponsored by the Special Cyber Operations Research and Engineering (SCORE) Subcommittee. SCORE increases awareness and insight,…
-
Device Integrity - 2015
Welcome to the Device Integrity Use Case Working Group. The purpose of this group is to provide a centralized repository for meeting minutes, supporting documents, and other material needed to help in the organization of your implementation plans.…
-
Science of Security VO
Virtually every computing system today is at risk from some form of cyber attack. The problem continues to grow in scope, in part because there does not exist today a foundational science of security. While the community is certainly making improvements…
-
Damage Containment - 2015
Welcome to the Damage Containment Use Case Working Group. The purpose of this group is to provide a centralized repository for meeting minutes, supporting documents, and other material needed to help in the organization of your implementation plans…
-
Defense of Accounts - 2015
Welcome to the Defense of Accounts Use Case Working Group. The purpose of this group is to provide a centralized repository for meeting minutes, supporting documents, and other material needed to help in the organization of your implementation…
-
Secure and Available Transport - 2015
Welcome to the Secure and Available Transport Use Case Working Group. The purpose of this group is to provide a centralized repository for meeting minutes, supporting documents, and other material needed to help in the organization of your…
-
Principles and Practice of Privacy Science (3PS) Program Committee
Working Agendas3PS Planning Workshop (Jun'15) Strawman Agenda3PS Strawman Agendas - 041020153PS-related Strawman Agendas - 050120153PS-related Strawman Agendas - 051120153PS-related Strawman Agendas - 052920153PS-related Strawman Agendas -…