Title Date
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainties
USE: User Security Behavior
Using Crowdsourcing to analyze and Summarize the Security of Mobile Applications
Classification of Cyber-Physical System Adversaries
End-to-End Analysis of Side Channels
Enhancing Cyber Security Through Networks Resilient to Targeted Attacks
From Measurements to Security Science: Data-Driven Approach
Protocol Verification: Beyond Reachability Properties
Quantitative Assessment of Access Control in Complex Distributed Systems
Scalable Methods for Security Against Distributed Attacks
The Science of Summarizing Systems: Generating Security Properties Using Data Mining and Formal Analysis
Secure Platforms via Stochastic Computing
Theoretical Foundations of Threat Assessment by Inverse Optimal Control
Toward a Theory of Resilience in Systems: A Game-Theoretic Approach
Towards a Science of Securing Network Forwarding
Trust from Explicit Evidence: Integrating Digital Signatures and Formal Proofs
Quantitative Security Metrics for Cyber-Human Systems
Paper Competition - Open Soon 'Contact Us'
7th Annual Best Scientific Cybersecurity Paper Competition Winners
9th SoS Paper Competition Review Team
A Human-Agent-Focused Approach to Security Modeling