Visible to the public Science of Security (SoS) Newsletter (2015 - Issue 10)Conflict Detection Enabled

SoS Newsletter- Advanced Book Block


Newsletter Banner

Science of Security (SoS) Newsletter (2015 - Issue 10)

Each issue of the SoS Newsletter highlights achievements in current research, as conducted by various global members of the Science of Security (SoS) community. All presented materials are open-source, and may link to the original work or web page for the respective program. The SoS Newsletter aims to showcase the great deal of exciting work going on in the security community, and hopes to serve as a portal between colleagues, research projects, and opportunities.

Please feel free to click on any issue of the Newsletter, which will bring you to their corresponding subsections:

  • In the News
  • Conferences
  • Publications of Interest
  • Upcoming Events of Interest.

Publications of Interest

The Publications of Interest provides available abstracts and links for suggested academic and industry literature discussing specific topics and research problems in the field of SoS. Please check back regularly for new information, or sign up for the CPSVO-SoS Mailing List.

Table of Contents

Science of Security (SoS) Newsletter (2015 - Issue 10)

International Security Related Conferences
    • International Conferences: MobiCom 2015, Paris
    • International Conferences: MobiHoc 2015, China
    • International Conferences: SACMAT 2015, Vienna
    • International Conferences: SIGMIS-CPR 2015, Newport Beach, CA
    • International Conferences: WiSec 2015, New York
Publications of Interest
    • Asymmetric Encryption 2015
    • Digital Signatures and Privacy 2015
    • Efficient Encryption 2015
    • Embedded System Security 2015
    • Expert Systems Security 2015
    • Facial Recognition 2015
    • Forward Error Correction 2015
    • Fuzzy Logic and Security 2015
    • Hardware Trojan Horse Detection 2015
    • Honey Pots 2015
    • Host-based IDS 2015
    • Resilience Indicators 2015
    • Resilience Metrics 2015
    • Security by Default 2015
    • SQL Injections 2015
    • Theoretical Cryptography 2015
    • Visible Light Communications Security 2015
    • Weaknesses 2015
    • Work Factor Metrics 2015



Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.