Title Date
Operating Systems Security (2014 Year in Review), Part 3
Hard Problems: Scalability and Composability (2014 Year in Review)
Hard Problems: Predictive Security Metrics (ACM)
Hard Problems: Predictive Security Metrics (IEEE)
Citations for Hard Problems (2014 Year in Review)
Phishing (IEEE) (2014 Year in Review), Part 1
Phishing (IEEE) (2014 Year in Review), Part 2
Phishing (ACM) (2014 Year in Review)
Elliptic Curve Cryptography from ACM, 2014, Part 1
Elliptic Curve Cryptography from ACM, 2014, Part 2
Software Security, 2014 (IEEE), Part 1
Software Security, 2014 (IEEE), Part 2
Software Security, 2014 (ACM), Part 1
Software Security, 2014 (ACM), Part 2
Malware Analysis, Part 1
Malware Analysis 2014, Part 1 (ACM)
Malware Analysis, 2014, Part 2 (ACM)
Internet of Things Security Problems
Trustworthy Systems, Part 1
Trustworthy Systems, Part 2
Journal: IEEE Transactions on Information Forensics and Security, March 2015
Security Conference Publications, Early 2015
Cryptology and Data Security, 2014
Smart Grid Security
Coding Theory and Security, 2014, Part 1