3 Years After L.4 Verified |
|
Lessons from Twenty Years of Industrial Formal Methods |
|
Margrave: Query-Based Policy Analysis |
|
SPARKSkein – A Formal and Fast Reference Implementation of the Skein Hash Algorithm |
|
The Guardol Language and Verification System |
|
Detecting Malicious Activity in Wireless Sensor Networks using Topic Modeling with Latent Dirichlet Allocation |
|
Quest-V: A Virtualized Multikernel for High-Confidence Systems |
|
Science of Security |
|
Designing for the Human Element in Security |
|
Are Scientific Experiments in Security Possible? |
|
The Science of Cyberspace – Laying the Foundation |
|
Lessons from 20 Years of Industrial Formal Methods |
|
Is Finding Security Holes a Good Idea? |
|
NSA SVP Hard Problem Overview |
|
Federal Cybersecurity R&D Strategy: Changing The Game |
|
Bridging CS and Biology for CyberSecurity |
|
The Science Of Security: A Formal Perspective |
|
Computer Security: Science, Engineering, Economics and a Bit of Reality |
|
Planet Dynamic or: How I Learned to Stop Worrying and Love Reflection |
|
Dependent Types for JavaScript |
|
JSCert: Certifying JavaScript |
|
Verifying JavaScript and Creating Foundations for the Web |
|
You Can't Touch This |
|
From SMT Solvers to Verifiers |
|