Title Date
3 Years After L.4 Verified
Lessons from Twenty Years of Industrial Formal Methods
Margrave: Query-Based Policy Analysis
SPARKSkein – A Formal and Fast Reference Implementation of the Skein Hash Algorithm
The Guardol Language and Verification System
Detecting Malicious Activity in Wireless Sensor Networks using Topic Modeling with Latent Dirichlet Allocation
Quest-V: A Virtualized Multikernel for High-Confidence Systems
Science of Security
Designing for the Human Element in Security
Are Scientific Experiments in Security Possible?
The Science of Cyberspace – Laying the Foundation
Lessons from 20 Years of Industrial Formal Methods
Is Finding Security Holes a Good Idea?
NSA SVP Hard Problem Overview
Federal Cybersecurity R&D Strategy: Changing The Game
Bridging CS and Biology for CyberSecurity
The Science Of Security: A Formal Perspective
Computer Security: Science, Engineering, Economics and a Bit of Reality
Planet Dynamic or: How I Learned to Stop Worrying and Love Reflection
Dependent Types for JavaScript
JSCert: Certifying JavaScript
Verifying JavaScript and Creating Foundations for the Web
You Can't Touch This
From SMT Solvers to Verifiers