Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
Home
All
CMU
NCSU
UIUC
UMD
Publications
HSR Guidance
Logo Directory
Members
Files
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» OCT'16
Oct'16
tearline
Human Behavior and Cyber Vulnerabilities - UMD - October 2016
Submitted by jkatz on Mon, 09/26/2016 - 9:30am
NSA Program Manager
Metrics
Human Behavior
UMD
Human Behavior and Cyber Vulnerabilities
FY14-18
Oct'16
tearline
Empirical Models for Vulnerability Exploits - UMD - October 2016
Submitted by jkatz on Mon, 09/26/2016 - 9:29am
NSA Program Manager
Metrics
UMD
Empirical Models for Vulnerability Exploits
FY14-18
Oct'16
tearline
Does the Presence of Honest Users Affect Intruders' Behavior? - UMD - October 2016
Submitted by jkatz on Mon, 09/26/2016 - 9:29am
NSA Program Manager
Human Behavior
UMD
Does the Presence of Honest Users Affect Intruders' Behavior
FY14-18
Oct'16
tearline
Understanding how Users Process Security Advice - UMD - October 2016
Submitted by jkatz on Mon, 09/26/2016 - 9:28am
NSA Program Manager
Human Behavior
UMD
Understanding How Users Process Security Advice
FY14-18
Oct'16
tearline
SoS Quarterly Summary Report - CMU - October 2016
Submitted by Jamie Presken on Thu, 09/15/2016 - 8:12am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Epistemic Models for Security
Geo-Temporal Characterization of Security Threats
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Race Vulnerability Study and Hybrid Race Detection
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
FY14-18
Oct'16
tearline
USE: User Security Behavior (CMU/Berkeley/University of Pittsburgh Collaborative Proposal) - October 2016
Submitted by Jamie Presken on Thu, 09/15/2016 - 8:08am
Approved by NSA
Human Behavior
CMU
USE: User Security Behavior
FY14-18
Oct'16
tearline
Smart Isolation in Large-Scale Production Computing Infrastructures - October 2016
Submitted by drwright on Wed, 09/14/2016 - 10:53am
Smart Isolation in Large-Scale Production Computing Infrastructures
Approved by NSA
Resilient Architectures
NCSU
Smart Isolation in Large-Scale Production Computing Infrastructures
FY14-18
Oct'16
tearline
Redundancy for Network Intrusion Prevention Systems (NIPS) - October 2016
Submitted by drwright on Wed, 09/14/2016 - 10:52am
Redundancy for Network Intrusion Prevention Systems (NIPS)
Approved by NSA
Resilient Architectures
NCSU
Redundancy for Network Intrusion Prevention Systems (NIPS)
Oct'16
tearline
Attack Surface and Defense-in-Depth Metrics - October 2016
Submitted by drwright on Wed, 09/14/2016 - 10:50am
NSA Program Manager
Scalability and Composability
Metrics
Resilient Architectures
NCSU
Attack Surface and Defense-in-Depth Metrics
FY14-18
Oct'16
tearline
Systematization of Knowledge from Intrusion Detection Models - October 2016
Submitted by drwright on Wed, 09/14/2016 - 10:48am
Systematization of Knowledge from Intrusion Detection Models
NSA Program Manager
Scalability and Composability
Metrics
Resilient Architectures
Human Behavior
NCSU
Systematization of Knowledge from Intrusion Detection Models
FY14-18
Oct'16
« first
‹ previous
1
2
3
4
5
next ›
last »