Visible to the public Science of Security VO

The 8th Annual Best Scientific Cybersecurity Paper Competition is now open for nominations. This year's nominating period runs through midnight on March 31, April 15, 2020. We look forward to receiving your nominations.
Subscribe to Reviews & Outreach (R&O) - designed to highlight some of the exciting research, news, and events that impact our technical community.
50th IEEE/IFIP Int. Conference on Dependable Systems and Networks Valencia, Spain June 29 - July 2, 2020 On behalf of the Organizing Committee, it is our pleasure to invite you to the 50th edition of the Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), to be held in Valencia, a...
The National Security Agency on January 23 highlighted the agency's work with University of Illinois Urbana Champaign. "As one of the initial schools to be designated to host an NSA Science of Security (SoS) Lablet, Illinois has been instrumental in stimulating basic research to create scientific underpinnings for...
The lastest information on all upcoming science of security related events.
Human Factors and Ergonomics Society (HFES) - Call for Papers HFES is looking for submissions of research and practice related to the human and cybersecurity! HFES is interested in building a broad community between human and cyber experts. The HFES society has added a CyberTechnical Group which will be accepting papers...
2020 27th Annual Network and Distributed System Security Symposium February 23-26, 2020 San Diego, CA The Network and Distributed System Security Symposium is a top venue that fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those...





  • Abstract: In this paper, we consider the problem of designing system parameters to improve detection of attacks in control systems. Specifically, we study control systems which are vulnerable to integrity attacks on sensors and actuators. We aim to defend against strong model aware adversaries that can read... more
  • Abstract: Big data platforms have grown popular for real-time stream processing on distributed clusters and clouds. However, execution of sensitive streaming applications on shared computing resources increases their vulnerabilities, and may lead to data leaks and injection of spurious logic that can... more
  • Abstract: Software-defined networking (SDN) allows the smart grid to be centrally controlled and managed by decoupling the control plane from the data plane, but it also expands attack surface for attackers. Existing studies about the security of SDN-enabled smart grid (SDSG) mainly focused on static methods... more
  • Abstract: This paper introduces an approach based on control theory to model, analyze and select optimal security policies for Moving Target Defense (MTD) deployment strategies. A Markov Decision Process (MDP) scheme is presented to model states of the system from attacking point of view. The employed value... more
  • Abstract: Distributed Denial of Service attack is very harmful to software-defined networking. Effective defense measures are the key to ensure SDN security. An adaptive moving target defense scheme based on end information hopping for SDN is proposed. The source address entropy value and the flow rate... more