Science of Security (SoS) Newsletter (2014 - Issue 2) |
|
Publications of Interest |
|
In the News (2014-02) |
|
Acoustic Fingerprints |
|
Agents |
|
Artificial Intelligence |
|
Computer Science as a Theoretical Science |
|
Dynamical Systems |
|
Neural Networks |
|
Scientific Computing |
|
Text Analytics |
|
Cross Layer Security |
|
Cross Site Scripting |
|
Data Deletion and Forgetting |
|
Information Theoretic Security |
|
Physical Layer Security |
|
Radio Frequency Identification |
|
Weaknesses |
|
SQL Injections |
|
Risk Estimations |
|
Analogical Transfer |
|
Effectiveness and Work Factor Metrics |
|
Human Factors |
|
Science of Security (SoS) Newsletter (2014 - Issue 3) |
|
Publications of Interest (2014 - Issue 3) |
|