| Lablet Quarterly Meeting at NCSU, Feb 2–3, 2016 |
|
| Science of Security (SoS) Newsletter (2016 - Issue 3) |
|
| Science of Security (SoS) Newsletter (2016 - Issue 4) |
|
| Science of Security (SoS) Newsletter (2016 - Issue 5) |
|
| Science of Security Annual Report 2015 |
|
| Hard Problems: Predictive Metrics 2015 |
|
| Hard Problems: Resilient Security Architectures 2015 |
|
| Hard Problems: Policy-based Security Governance 2015 |
|
| Hard Problems: Scalability and Composability 2015 |
|
| Hash Algorithms 2015 |
|
| Intellectual Property Protection 2015 |
|
| Identity Management 2015 |
|
| Elliptic Curve Cryptography 2015 |
|
| Data Sanitization 2015 |
|
| Data in Motion and Data at Rest 2015 |
|
| Integrity of Outsourced Databases 2015 |
|
| Immersive Systems 2015 |
|
| Acoustic Fingerprints 2015 |
|
| Compiler Security 2015 |
|
| Cross Layer Security 2015 |
|
| Information Theoretic Security 2015 |
|
| Automated Response Actions 2015 |
|
| Quick Response (QR) Code 2015 |
|
| International Security Related Conferences |
|
| Composability 2015 |
|