Pub Crawl #1

 

Image removed.The Pub Crawl section summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Advanced Persistent Threat Image removed.Image removed.Image removed.Image removed.Image removed.

Advanced persistent threats are the subject of considerable research of interest to the Science of Security community. This research looks at behavioral as well as technical aspects. 

Channel Coding and Encryption (2015) Image removed.Image removed.Image removed.

Channel coding, also known as Forward Error Correction, are methods for controlling errors in data transmissions over noisy or unreliable communications channels. For cybersecurity, these methods can also be used to ensure data integrity, as some of the research cited below shows. The work cited here relates to the Science of Security problems of metrics, resiliency, and composability. 

Clean Slate (2015) Image removed.Image removed.Image removed.Image removed.

The "clean slate" approach looks at designing networks and internets from scratch, with security built in, in contrast to the evolved Internet in place. The research presented here covers a range of research topics, and includes items of interest to the Science of Security, including human behavior, resilience, metrics, and policy governance. The research was presented in 2015. This bibliography completes an earlier survey of 2015 posted before the end of the year.

Compressive Sampling (2015)Image removed.Image removed.Image removed.

Compressive sampling (or compressive sensing) is an important theory in signal processing. It allows efficient acquisition and reconstruction of a signal and may also be the basis for user identification. For the Science of Security, the topic has implications for resilience, cyber-physical systems, privacy, and composability. They complete an earlier bibliography.

Computational Intelligence Data Security and Privacy (2015)Image removed.

Computational intelligence includes such constructs as artificial neural networks, evolutionary computation and fuzzy logic. It embraces biologically inspired algorithms such as swarm intelligence and artificial immune systems and includes broader fields such as image processing, data mining, and natural language processing. Its relevance to the Science of Security is related to scalability and compositionality, as well as cryptography. 

Confinement (2015)Image removed.Image removed.

In photonics, confinement is important to loss avoidance. In quantum theory, it relates to energy levels. Containment is important in the contexts of cyber-physical systems, privacy, resiliency, and composability. This completes a bibliography previously posted before year's end.

Control Theory Resiliency and Security (2015) Image removed.

In the Science of Security, control theory offers methods and approaches to potentially solve hard problems. The research work presented here specifically addresses issues in resiliency. 

Control Theory Security and Smart Grids (2015)

In the Science of Security, control theory offers methods and approaches to potentially solve hard problems. The research work presented here specifically addresses issues related to smart grids. 

Cyber Crime Analysis 2015Image removed.

As cyber-crime grows, methods for preventing, detecting, and responding are growing as well. Research is examining new faster more automated methods for dealing with cyber-crime both from a technical and a behavioral standpoint. For the Science of Security community, the behavioral aspects are of great interest. 

Discrete and Continuous Optimization 2015 Final  Image removed.Image removed.Image removed.Image removed.Image removed.

Discrete and continuous optimization are mathematical approaches to problem solving. The research works cited here are primarily focused on continuous optimization. For Science of Security, they relate to cyber-physical systems, resilience, and composability. Some of the most important work is being done in control systems. 

Edge Detection Metrics 2015 Image removed.Image removed.Image removed.Image removed.Image removed.

Edge detection is an important issue in image and signal processing. The work cited here looks at the development of metrics. 

Supply Chain Security 2015  Image removed.Image removed.Image removed.Image removed.Image removed.

Threats to the supply chain in terms of delivery, integrity, content and the provenance of components and parts appear to be growing. The research cited here looks at the security in the supply chain from multiple perspectives, including resilient architectures. 

Facial Recognition and Privacy 2015  Image removed.Image removed.Image removed.Image removed.Image removed.

Facial recognition tools have long been the stuff of action-adventure films. In the real world, they present opportunities and complex problems being examined by researchers. The works cited here, presented or published in 2015, address various techniques and issues such as the use of TDM, PCA and Markov models, application of keystroke dynamics to facial thermography, multiresolution alignment, and sparse representation. These works complete a bibliography previously posted.

Honey Pots Final 2015  Image removed.Image removed.Image removed.Image removed.Image removed.

Honeypots area traps set up to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers. With increased network size and complexity, the need for advanced methods is growing. Specifically, cloud and virtual security need advanced methods for malware detection and collection. The articles cited here reflect current thinking on honeypots. 

Keystroke Analysis Final 2015 Image removed.Image removed.Image removed.Image removed.Image removed.

Keystrokes are a basis for behavioral biometrics. The rhythms and patterns of the individual user can become the basis for a unique biological identification. Research into this area of computer security is growing. For the Science of Security, keystroke analysis is relevant to the hard problems of human behavior factors and predictive metrics.

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.