Science of Security (SoS) Newsletter (2015 - Issue 4)
Each issue of the SoS Newsletter highlights achievements in current research, as conducted by various global members of the Science of Security (SoS) community. All presented materials are open-source, and may link to the original work or web page for the respective program. The SoS Newsletter aims to showcase the great deal of exciting work going on in the security community, and hopes to serve as a portal between colleagues, research projects, and opportunities.
Please feel free to click on any issue of the Newsletter, which will bring you to their corresponding subsections:
- In the News
- Conferences
- Publications of Interest
- Upcoming Events of Interest.
Publications of Interest
The Publications of Interest provides available abstracts and links for suggested academic and industry literature discussing specific topics and research problems in the field of SoS. Please check back regularly for new information, or sign up for the CPSVO-SoS Mailing List.
Table of Contents
Science of Security (SoS) Newsletter (2015 - Issue 4)
- In the News (2015 - Issue 4)
- International Security Related Conferences (2015 - Issue 4)
- Cybersecurity Conference Publications, Early 2015
- International Conferences: Information Theory Workshop (ITW), 2014, Hobart, Tasmania
- International Conferences: Computer Security Applications Conference, December 2014, New Orleans, Part 1
- International Conferences: Computer Security Applications Conference, December 2014, New Orleans, Part 2
- International Conferences: Information Networking (ICOIN), 2015, Cambodia
- International Conferences: Innovations in Theoretical Computer Science, Israel, 2015
- International Conferences: Signal Processing and Integrated Networks (SPIN), 2015
- International Conferences: Signal Processing, Informatics, Communication & Energy Systems (SPICES), India, 2015
- Security Conference Publications, Early 2015
- Publications of Interest (2015 - Issue 4)
- Citations for Hard Problems (2014 Year in Review)
- Elliptic Curve Cryptography (2014 Year in Review), Part 1
- Elliptic Curve Cryptography (2014 Year in Review), Part 2
- Elliptic Curve Cryptography (2014 Year in Review), Part 3
- Elliptic Curve Cryptography (2014 Year in Review), Part 4
- Elliptic Curve Cryptography (2014 Year in Review), Part 5
- Hard Problems: Scalability and Composability (2014 Year in Review)
- Insider Threats (2014 Year in Review)
- Internet of Things Security Problems
- Operating Systems Security (2014 Year in Review), Part 1
- Operating Systems Security (2014 Year in Review), Part 2
- Operating Systems Security (2014 Year in Review), Part 3
- Phishing (ACM) (2014 Year in Review)
- Phishing (IEEE) (2014 Year in Review), Part 1
- Phishing (IEEE) (2014 Year in Review), Part 2
- Quantum Computing Security (2014 Year in Review)
- Vulnerability Detection (2014 Year in Review), Part 1
- Vulnerability Detection (2014 Year in Review), Part 2
- Vulnerability Detection (2014 Year in Review), Part 3
- Vulnerability Detection (2014 Year in Review), Part 4
- Upcoming Events of Interest (2015 - Issue 4)
(ID#:15-5520)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to news@scienceofsecurity.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.