| China’s Cyber Warfare Dominance: How Artificial Intelligence is Shaping the Future of Global Conflicts |
|
| IEEE 2025 HPEC Free Virtual Conference |
|
| Countering China State-Sponsored Actors Targeting Critical Infrastructure Organizations |
|
| CISA and Partners Providing Real-Time Incident Response to Cyber Attack on State of Nevada |
|
| Mission Autonomy Hackathon at Vanderbilt (Oct 6–10, 2025) |
|
| Invitation: Mission Autonomy Hackathon at Vanderbilt (Oct 6–10, 2025) |
|
| Former ONCD official urges defense industrial base to integrate formal methods to ensure software cyber resilience |
|
| New Edition: The Next Wave, Vol. 26, No. 1, 2025 |
|
| HotSoS 2026 CFP PDF |
|
| Position Opening: Experimental Quantum Science at Princeton University |
|
| Position Opening: ECE at University of Texas at Dallas |
|
| SEAMS 2026 |
|
| Assurance and Security for AI-enabled Systems 2026 |
|
| ERSA'25 |
|
| 28th Brazilian Symposium on Formal Methods (SBMF’25) |
|
| MODELSWARD 2026 |
|
| CISA Adds Three Known Exploited Vulnerabilities to Catalog |
|
| Four Industrial Control Systems Advisories Released by CISA |
|
| Call for Papers: MDE4SA ’26 Workshop |
|
| Call for Papers: ECOOP 2026 |
|
| HCSS 2026 Program Agenda |
|
| HCSS 2026 Venue |
|
| HCSS 2026: Call for Presentations |
|
| NSA Releases Guidance on Mitigating Malicious Activity from Bulletproof Hosting Provider Infrastructure |
|
| CISA urges mobile security |
|