| Secure Composition of Systems and Policies |
|
| Security Reasoning for Distributed Systems with Uncertainties |
|
| USE: User Security Behavior |
|
| Using Crowdsourcing to analyze and Summarize the Security of Mobile Applications |
|
| Classification of Cyber-Physical System Adversaries |
|
| End-to-End Analysis of Side Channels |
|
| Enhancing Cyber Security Through Networks Resilient to Targeted Attacks |
|
| From Measurements to Security Science: Data-Driven Approach |
|
| Protocol Verification: Beyond Reachability Properties |
|
| Quantitative Assessment of Access Control in Complex Distributed Systems |
|
| Scalable Methods for Security Against Distributed Attacks |
|
| The Science of Summarizing Systems: Generating Security Properties Using Data Mining and Formal Analysis |
|
| Secure Platforms via Stochastic Computing |
|
| Theoretical Foundations of Threat Assessment by Inverse Optimal Control |
|
| Toward a Theory of Resilience in Systems: A Game-Theoretic Approach |
|
| Towards a Science of Securing Network Forwarding |
|
| Trust from Explicit Evidence: Integrating Digital Signatures and Formal Proofs |
|
| Quantitative Security Metrics for Cyber-Human Systems |
|
| Paper Competition - Open Soon 'Contact Us' |
|
| 7th Annual Best Scientific Cybersecurity Paper Competition Winners |
|
| 9th SoS Paper Competition Review Team |
|
| A Human-Agent-Focused Approach to Security Modeling |
|