| 3 Years After L.4 Verified |
|
| Lessons from Twenty Years of Industrial Formal Methods |
|
| Margrave: Query-Based Policy Analysis |
|
| SPARKSkein – A Formal and Fast Reference Implementation of the Skein Hash Algorithm |
|
| The Guardol Language and Verification System |
|
| Detecting Malicious Activity in Wireless Sensor Networks using Topic Modeling with Latent Dirichlet Allocation |
|
| Quest-V: A Virtualized Multikernel for High-Confidence Systems |
|
| Science of Security |
|
| Designing for the Human Element in Security |
|
| Are Scientific Experiments in Security Possible? |
|
| The Science of Cyberspace – Laying the Foundation |
|
| Lessons from 20 Years of Industrial Formal Methods |
|
| Is Finding Security Holes a Good Idea? |
|
| NSA SVP Hard Problem Overview |
|
| Federal Cybersecurity R&D Strategy: Changing The Game |
|
| Bridging CS and Biology for CyberSecurity |
|
| The Science Of Security: A Formal Perspective |
|
| Computer Security: Science, Engineering, Economics and a Bit of Reality |
|
| Planet Dynamic or: How I Learned to Stop Worrying and Love Reflection |
|
| Dependent Types for JavaScript |
|
| JSCert: Certifying JavaScript |
|
| Verifying JavaScript and Creating Foundations for the Web |
|
| You Can't Touch This |
|
| From SMT Solvers to Verifiers |
|