Introducing DARPA's Cyber Grand Challenge
Unambiguous Encapsulation - Separating Data and Signaling
A Critical Review of Spatial Analysis
Data Whales and Troll Tears: Beat the Odds in InfoSec
Operationalizing Threat Information Sharing: Beyond Policies and Platitudes
The "Science of Cyber" and the Next Generation of Security Tools
Timing-Based Attestation: Sexy Defense, or the Sexiest?
"How I Met Your Mother" or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age
Raising Costs for Your Attackers Instead of Your CFO
Practical Applications of Data Science in Detection