NY Times Article About Behavior |
|
Password Security through Negative Authentication |
|
Process Query Systems |
|
Symantec Global Internet Security Threat Report |
|
Terrorist Capabilities for Cyberattack: Overview and Policy Issues |
|
The Theory of Trackability with Applications to Sensor Networks |
|
Traffic and Attack Pattern Analysis for Multiagent Distributed Intrusion Detection System |
|
Welcome and Introductions: SoS Quarterly Lablet Meeting at CMU |
|
Laying the Cyber Foundations: The Science of Security and Privacy Initiative |
|
Optimal State Estimation and Model Detection and Applications to Security and Privacy |
|
Prioritizing Security Efforts with a Risk-Based Attack Surface Approximation |
|
Immutability for Integrity: Combining Language Theory and the Science of Usability in Glacier |
|
Observing Passwords in Their Natural Habitat |
|
UMD Lablet Overview |
|
UIUC Lablet Overview |
|
NCSU SoS Lablet Summary |
|
CMU SoS Lablet Summary |
|
Vulnerability Disclosure In the Age of Social Media: Exploiting Twitter for Predicting Real-world Exploits |
|
The Role of Experimental Science in Cybersecurity |
|
Discovering Emergent Behavior From Network Packet Data: Lessons from the Angle Project |
|
Castle Warrior: Redefining 21st Century Network Defense |
|
Edwards et al 2017 - Strategic Aspects of Cyberattack, Attribution, and ....pdf |
|