Cybersecurity of space systems is an emerging topic, but there is no sin...
Cyber ranges mimic real-world cyber environments and are in high demand....
Machine Learning (ML) techniques facilitate automating malicious softwar...
The theory of learning in games has extensively studied situations where...
Social engineering attacks are a major cyber threat because they often s...
The deployment of monoculture software stacks can have devastating
conse...
The deployment of monoculture software stacks can cause a devastating da...
The deep learning approach to detecting malicious software (malware) is
...
Automatically detecting software vulnerabilities in source code is an
im...
COVID-19 has hit hard on the global community, and organizations are wor...
COVID-19 (Coronavirus) hit the global society and economy with a big
sur...
Secure group communications are a mechanism facilitating protected
trans...
Cybersecurity Dynamics is new concept that aims to achieve the modeling,...
Social engineering cyberattacks are a major threat because they often pr...
The bribery problem in election has received considerable attention in t...
Malicious software (malware) is a major cyber threat that shall be tackl...
Machine learning based malware detection is known to be vulnerable to
ad...
Cybersecurity dynamics is a mathematical approach to modeling and analyz...
Automatically detecting software vulnerabilities is an important problem...
Fine-grained software vulnerability detection is an important and challe...
Deep Learning has been very successful in many application domains. Howe...
Intrusion Detection Systems (IDSs) are a necessary cyber defense mechani...
The blockchain technology is believed by many to be a game changer in ma...
In cyberspace, evolutionary strategies are commonly used by both attacke...
Malware continues to be a major cyber threat, despite the tremendous eff...
We develop a decentralized coloring approach to diversify the nodes in a...
Public blockchains provide a decentralized method for storing transactio...
Bribery in election (or computational social choice in general) is an
im...
The accurate measurement of security metrics is a critical research prob...
Adversarial machine learning in the context of image processing and rela...
The detection of software vulnerabilities (or vulnerabilities for short)...
The automatic detection of software vulnerabilities is an important rese...
Malicious websites are a major cyber attack vector, and effective detect...