Secure Composition of Systems and Policies |
|
Security Reasoning for Distributed Systems with Uncertainties |
|
USE: User Security Behavior |
|
Using Crowdsourcing to analyze and Summarize the Security of Mobile Applications |
|
Classification of Cyber-Physical System Adversaries |
|
End-to-End Analysis of Side Channels |
|
Enhancing Cyber Security Through Networks Resilient to Targeted Attacks |
|
From Measurements to Security Science: Data-Driven Approach |
|
Protocol Verification: Beyond Reachability Properties |
|
Quantitative Assessment of Access Control in Complex Distributed Systems |
|
Scalable Methods for Security Against Distributed Attacks |
|
The Science of Summarizing Systems: Generating Security Properties Using Data Mining and Formal Analysis |
|
Secure Platforms via Stochastic Computing |
|
Theoretical Foundations of Threat Assessment by Inverse Optimal Control |
|
Toward a Theory of Resilience in Systems: A Game-Theoretic Approach |
|
Towards a Science of Securing Network Forwarding |
|
Trust from Explicit Evidence: Integrating Digital Signatures and Formal Proofs |
|
Quantitative Security Metrics for Cyber-Human Systems |
|
Paper Competition - Open Soon 'Contact Us' |
|
7th Annual Best Scientific Cybersecurity Paper Competition Winners |
|
9th SoS Paper Competition Review Team |
|
A Human-Agent-Focused Approach to Security Modeling |
|