Title Date
About SoS
Education
C3E 2019 Mid-Year Event Agenda
AFOSR: Information, Operations, and Security Program Review
DHOSA: Defending Against Hostile Operating Systems
CyberBAT: High Performance Cloud Auditing and Applications
Using Computational Resources Without Assuming Their Correctness
Controllability of Complex Networks
Cybersecurity through Nimble Task Allocation: Workflow Reasoning for Mission-Centered Network Models
Information Flow Integrity for Systems of Independently-Developed Components
On the (Im)Possibility of Tamper-Resilient Cryptography
Concurrency Attacks and Defenses
Protection of Mission-Critical Applications from Untrusted Execution Environments
Timing-based Inference: The Good, the Bad, and the Ugly
Towards Practical Measures of Security
Towards a Proof-Carrying Approach for Survivability Specification and Verification
Integrating Programming Language and Operating System Information Security Mechanisms
Stochastic Cyber Attack Processes: Concept, Statistical Analysis Framework and Case Study
The Industrial Age of Hacking
Information/Cognitive Warfare Across the Information Environment
C3E Accounts
C3E Fall 2019 Venue
C3E Planning
Funding Opportunities
C3E Fall 2019 Workshop Agenda