| Science of Security (SoS) Newsletter (2014 - Issue 2) |
|
| Publications of Interest |
|
| In the News (2014-02) |
|
| Acoustic Fingerprints |
|
| Agents |
|
| Artificial Intelligence |
|
| Computer Science as a Theoretical Science |
|
| Dynamical Systems |
|
| Neural Networks |
|
| Scientific Computing |
|
| Text Analytics |
|
| Cross Layer Security |
|
| Cross Site Scripting |
|
| Data Deletion and Forgetting |
|
| Information Theoretic Security |
|
| Physical Layer Security |
|
| Radio Frequency Identification |
|
| Weaknesses |
|
| SQL Injections |
|
| Risk Estimations |
|
| Analogical Transfer |
|
| Effectiveness and Work Factor Metrics |
|
| Human Factors |
|
| Science of Security (SoS) Newsletter (2014 - Issue 3) |
|
| Publications of Interest (2014 - Issue 3) |
|