Visible to the public Science of Security VO

In the Spotlight

The 2015 NSA Research Directorate Award was presented to three research projects at the 2015 Intel International Science and Engineering Fair on May 14th, 2015. First Place ($3,000): A Novel Algorithm for #SAT Using Inclusion-Exclusion Principle and Memorization by Elliot Gorokhovsky, 16 from Fairview High School in...
The lastest information on all upcoming science of security related events.
Now open for submissions the 3rd Annual Best Scientific Cybersecurity Paper Competition invites nominations of published papers that show an outstanding contribution to cybersecurity science. Click here for more details about this year's competition.
The Symposium and Bootcamp on the Science of Security was held April 21 and 22 at the University of Illinois at Urbana-Champaign. Hot SoS is a research event centered on the Science of Security, which aims to address the fundamental problems of security in a principled manner. The 2015 Hot SoS event will brought together...
Under the auspices of DARPA's Integrity and Reliability of Integrated Circuits program, researchers from the Naval Surface Warfare Center (NSWC) and Air Force Research Laboratory (AFRL) are developing advanced failure analysis techniques to assess the reliability and integrity of microchips embedded in the some of the...
The CASOS Summer Institute is a week-long workshop hosted by CASOS, the Center for Computational Analysis of Social and Organizational Systems, at Carnegie Mellon University, Pittsburgh, PA. During the year, our faculty and students conduct research using powerful analytical tools developed by the lab director, Dr...
The Department of Homeland Security (DHS) has collections of databases in its data repository PREDICT (Protected Repository for Defense of Infrastructure Against Cyber Threats) which is open for the cyber research community to use. More Information on PREDICT and its Data Classes can be found at https://www.predict.org...
The Deter Project is a research project and a cyber experimental testbed. It has the goal of allowing for repeatable, scalable and scientifically verifiable experimentation -- for homeland security and critical infrastructure protection. It is funded by DHS, NSF and DoD. They are open to collaboration others to use the...

Visible to the public 

Recently Posted Publications

  • Abstract: An identity authentication scheme is proposed combining with biometric encryption, public key cryptography of homomorphism and predicate encryption technology under the cloud computing environment. Identity authentication scheme is proposed based on the voice and homomorphism technology. The scheme... more
  • Abstract: By enabling a direct comparison of different security solutions with respect to their relative effectiveness, a network security metric may provide quantifiable evidences to assist security practitioners in securing computer networks. However, research on security metrics has been hindered by... more
  • Abstract: Zero-day polymorphic worms pose a serious threat to the Internet security. With their ability to rapidly propagate, these worms increasingly threaten the Internet hosts and services. Not only can they exploit unknown vulnerabilities but can also change their own representations on each new... more

Recent News