Visible to the public Science of Security VO

HOTSOS 2022 BEST UNDERGRADUATE POSTER AWARD Congratulations to Sanjana Cheerla at NCSU for winning the HoTSoS Best Undergraduate Poster Award for their poster Identifying Online Misbehavior. Check out the Announcement & Closing Remarks stream here!  
The 39th International Conference on Machine Learning (ICML 2022) will be held in Baltimore, Maryland USA July 17-23, 2022 and is planned to be an in-person conference with virtual elements. In addition to the main conference sessions, the conference will also include Expo, Tutorials, and Workshops. Please submit proposals...
The Science of Security and Privacy 2022 Annual Report is now available. This report highlights the progress and accomplishments of the Science of Security and Privacy initiative.
HOTSOS 2022 BEST POSTER AWARD Congratulations to Samin Yaseer Mahmud & William Enck at NCSU for winning the HoTSoS Best Poster Award for their poster A Study of Security Weakness in Android Payment Service Provider SDKs.  Check out the Announcement & Closing Remarks stream here...
"On One-way Functions and Kolmogorov Complexity" wins the 9th Annual Best Scientific Cybersecurity Paper Competition. This paper was written by Yanyi Liu from Cornell University and Rafael Pass from Cornell Tech. An honorable mention award was given to "Retrofitting Fine Grain Isolation in the Firefox Renderer” written by...
The lastest information on all upcoming science of security related events.
2022 IEEE International Conference on Cyber Security and Resilience The technological and industrial revolution brought by complex Cyber-Physical Systems (CPSs) comes with new threats and cyber-attacks that exploit their inherent complexity and heterogeneity. These attacks have a significant negative impact on the...
Cybersecurity Snapshots #31 - Healthcare Organizations Are Being Inundated With Cyberattacks Attackers have realized hospitals are prime targets for cyberattacks, so healthcare leaders must prioritize protecting their systems. In 2021, healthcare organizations were inundated with cyberattacks, and they can expect more to...

Visible to the public 

  • Abstract: Generative Adversarial Networks (GANs) are machine learning methods that are used in many important and novel applications. For example, in imaging science, GANs are effectively utilized in generating image datasets, photographs of human faces, image and video captioning, image-to-image translation... more
  • Abstract: Nowadays, children, teens, and almost everyone around us tend to receive abundant and frequent advice regarding the usefulness of syllabification. Not only does it improve pronunciation, but it also makes it easier for us to read unfamiliar words in chunks of syllables rather than reading them all... more
  • Abstract: Evolutionary computation (EC) is a kind of advanced computational intelligence (CI) algorithm and advanced artificial intelligence (AI) algorithm. EC algorithms have been widely studied for solving optimization and scheduling problems in various real-world applications, which act as one of the Big... more
  • Abstract: In the Swarm Intelligence domain, the firefly algorithm(s) is the most significant algorithm applied in most all optimization areas. FA and variants are easily understood and implemented. FA is capable of solving different domain problems. For solving diverse range of engineering problems requires... more
  • Abstract: Numerical simulation of fluid flow is a significant research concern during the design process of a machine component that experiences fluid-structure interaction (FSI). State-of-the-art in traditional computational fluid dynamics (CFD) has made CFD reach a relative perfection level during the last... more