Visible to the public Science of Security VO

In the Spotlight

The lastest information on all upcoming science of security related events.
The Research Directorate of the National Security Agency announced the winner of this year's Science of Security (SoS) Best Scientific Cybersecurity Paper Competition. Of the 50 papers nominated, one winner and two honorable mentions were chosen. Congratulations to all the winners! 3rd ANNUAL NSA COMPETITION FOR THE...
International Computer Science Institute and the University of California Berkeley are researching web browser messages. They are working to make them less confusing. The Firefox extension prompts surveys on triggered events. It doesn't collect browsing history. It's been IRB approved. More Info: https://surveys.cs....
The Symposium and Bootcamp on the Science of Security was held April 21 and 22 at the University of Illinois at Urbana-Champaign. Hot SoS is a research event centered on the Science of Security, which aims to address the fundamental problems of security in a principled manner. The 2015 Hot SoS event will brought together...
The Science of Security (SoS) quarterly Lablet meeting, sponsored by NSA, was hosted by the Carnegie Mellon University Lablet on July 14 and 15, 2015.  Quarterly meetings are held to share research, coordinate, present interim findings, and stimulate thought and discussion about the Science of Security.  Two...
The University of Illinois will lead a new multidisciplinary center designed to help government and industry beef up the resilience of the nation's cyber infrastructure, including the power grid, telecommunications networks and transportation systems. It is funded by DHS and is about $20 million over 5 years. "The effort...
The Department of Homeland Security (DHS) has collections of databases in its data repository PREDICT (Protected Repository for Defense of Infrastructure Against Cyber Threats) which is open for the cyber research community to use. More Information on PREDICT and its Data Classes can be found at https://www.predict.org...
Darpa annouced the 7 finalist for the Cyber Grand Challenge with a $2 million prize. CodeJitsu (Berkeley, Calif.): A team affiliated with the University of California, Berkeley ForAllSecure (Pittsburgh, Pa.): A startup founded by a team of computer security researchers from Carnegie Mellon University TECHx (...

Visible to the public 

Recently Posted Publications

  • Abstract: An identity authentication scheme is proposed combining with biometric encryption, public key cryptography of homomorphism and predicate encryption technology under the cloud computing environment. Identity authentication scheme is proposed based on the voice and homomorphism technology. The scheme... more
  • Abstract: By enabling a direct comparison of different security solutions with respect to their relative effectiveness, a network security metric may provide quantifiable evidences to assist security practitioners in securing computer networks. However, research on security metrics has been hindered by... more
  • Abstract: Zero-day polymorphic worms pose a serious threat to the Internet security. With their ability to rapidly propagate, these worms increasingly threaten the Internet hosts and services. Not only can they exploit unknown vulnerabilities but can also change their own representations on each new... more

Recent News

Upcoming Events