Visible to the public Science of Security VO

The Fall'21 Science of Security Quarterly Lablet Meeting will be hosted by The University  of Kansas on November 15-16, 2021. The program agenda will include invited talks from Dr. Robert Runser (NSA) and Dr. Natarajan Shankar (SRI) as well as briefs from the Lablets.  The meeting will be virtual. To gain access to the...
The Science of Security and Privacy 2022 Annual Report is now available. This report highlights the progress and accomplishments of the Science of Security and Privacy initiative.
HOTSOS 2022 BEST POSTER AWARD Congratulations to Samin Yaseer Mahmud & William Enck at NCSU for winning the HoTSoS Best Poster Award for their poster A Study of Security Weakness in Android Payment Service Provider SDKs.  Check out the Announcement & Closing Remarks stream here...
"On One-way Functions and Kolmogorov Complexity" wins the 9th Annual Best Scientific Cybersecurity Paper Competition. This paper was written by Yanyi Liu from Cornell University and Rafael Pass from Cornell Tech. An honorable mention award was given to "Retrofitting Fine Grain Isolation in the Firefox Renderer” written by...
HOTSOS 2022 BEST UNDERGRADUATE POSTER AWARD Congratulations to Sanjana Cheerla at NCSU for winning the HoTSoS Best Undergraduate Poster Award for their poster Identifying Online Misbehavior. Check out the Announcement & Closing Remarks stream here!  
The 39th International Conference on Machine Learning (ICML 2022) will be held in Baltimore, Maryland USA July 17-23, 2022 and is planned to be an in-person conference with virtual elements. In addition to the main conference sessions, the conference will also include Expo, Tutorials, and Workshops. Please submit proposals...
Subscribe to Reviews & Outreach (R&O) - designed to highlight some of the exciting research, news, and events that impact our technical community.
2022 IEEE International Conference on Cyber Security and Resilience The technological and industrial revolution brought by complex Cyber-Physical Systems (CPSs) comes with new threats and cyber-attacks that exploit their inherent complexity and heterogeneity. These attacks have a significant negative impact on the...

Visible to the public 

  • Abstract: Real time data analysis in the context of e.g. realtime monitoring or computational steering is an important tool in many fields of science, allowing scientists to make the best use of limited resources such as sensors and HPC platforms. These tools typically rely on large amounts of continuously... more
  • Abstract: Network slicing qualitatively transforms network infrastructures such that they have maximum flexibility in the context of ever-changing service requirements. While the agility of cloud native network functions (CNFs) demonstrates significant promise, virtualization and softwarization severely... more
  • Abstract: Deep reinforcement learning has recently been adopted for robot behavior learning, where robot skills are acquired and adapted from data generated by the robot while interacting with its environment through a trial-and-error process. Despite this success, most model-free deep reinforcement learning... more
  • Abstract: Satellite networks are booming to provide high-speed and low latency Internet access, but the transport layer becomes one of the main obstacles. Legacy end-to-end TCP is designed for terrestrial networks, not suitable for error-prone, propagation delay varying, and intermittent satellite links. It... more
  • Abstract: Deploying a new network architecture in the Internet requires changing some, but not necessarily all elements between communicating applications. One way to achieve gradual deployment is a proxy or gateway which "translates" between the new architecture and TCP/IP. We present such a proxy... more