| Protection of Mission-Critical Applications from Untrusted Execution Environments |
|
| Timing-based Inference: The Good, the Bad, and the Ugly |
|
| Towards Practical Measures of Security |
|
| Towards a Proof-Carrying Approach for Survivability Specification and Verification |
|
| Integrating Programming Language and Operating System Information Security Mechanisms |
|
| Stochastic Cyber Attack Processes: Concept, Statistical Analysis Framework and Case Study |
|
| The Industrial Age of Hacking |
|
| Information/Cognitive Warfare Across the Information Environment |
|
| C3E Accounts |
|
| C3E Fall 2019 Venue |
|
| C3E Planning |
|
| Funding Opportunities |
|
| C3E Fall 2019 Workshop Agenda |
|
| HoTSoS 2020 Program Committee |
|
| HCSS 2020 Program Committee |
|
| C3E Fall 2019: HMT Track Agenda |
|
| C3E Fall 2019: Cognitive Security Track Agenda |
|
| C3E 2018 Challenge Problem |
|
| HoTSoS'20 Call for Papers |
|
| HCSS 2020 Call for Presentations |
|
| HCSS About (Old) |
|
| 2012 Science of Security Community Meeting Presentations |
|
| 2012 Science of Security Community Meeting Posters |
|