Science of Security (SoS) Newsletter (2015 - Issue 8)
Each issue of the SoS Newsletter highlights achievements in current research, as conducted by various global members of the Science of Security (SoS) community. All presented materials are open-source, and may link to the original work or web page for the respective program. The SoS Newsletter aims to showcase the great deal of exciting work going on in the security community, and hopes to serve as a portal between colleagues, research projects, and opportunities.
Please feel free to click on any issue of the Newsletter, which will bring you to their corresponding subsections:
- In the News
- Conferences
- Publications of Interest
- Upcoming Events of Interest.
Publications of Interest
The Publications of Interest provides available abstracts and links for suggested academic and industry literature discussing specific topics and research problems in the field of SoS. Please check back regularly for new information, or sign up for the CPSVO-SoS Mailing List.
Science of Security (SoS) Newsletter (2015 - Issue 8)
- 3rd Annual Best Scientific Cybersecurity Paper Competition
- In the News
- International Security Related Conferences
- International Conferences: Chinese Control and Decision Conference (CCDC), Qingdao, China, 2015
- International Conferences: CYBCONF 2015, Poland
- International Conferences: CyberSA 2015, London
- International Conferences: IBCAST 2015, Islamabad
- International Conferences: Incident Management and Forensics (IMF), Germany, 2015
- International Conferences: INFOCOM 2015, Kowloon, Hong Kong, China
- International Conferences: NSysS 2015, Bangladesh
- Publications of Interest
- Adversary Models and Privacy, 2014
- Biometric Encryption and Privacy, 2014
- Compositional Security, 2014
- Consumer Privacy in the Smart Grid, 2014
- Encryption Audits, 2014
- Homomorphism, 2014
- I/O Systems Security, 2014
- Information Flow Analysis and Security, 2014
- Location Privacy—Authentication Approaches, 2014
- Location Privacy—Cloaking-Based Approaches, 2014
- MANET Security and Privacy, 2014
- PKI Trust Models, 2014
- Router System Security, 2014
- Software Assurance, 2014 Part 1
- Software Assurance, 2014, Part 2
- Taint Analysis, 2014
- Zero Day Exploits, Part 1
- Zero Day Exploits, Part 2
- Upcoming Events of Interest (2015 - Issue 8)
(ID#:15-7298)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to news@scienceofsecurity.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.