Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Science of Security VO
Home
About
Search
Calendar
Members
Contact Us
Forums
Files
CPS-VO
»
Science of Security VO
» UIUC
UIUC
biblio
Ethnography of Computer Security Evasions in Healthcare Settings: Circumvention as the Norm
Submitted by awhitesell on Fri, 02/10/2017 - 1:01pm
Science of Security
Science of Security
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security
file
Learning Impedance Controller Parameters for Lower-Limb Prostheses
Submitted by awhitesell on Fri, 02/10/2017 - 12:46pm
Science of Security
NSA SoS Lablets Materials
Science of Security
Theoretical Foundations of Threat Assessment by Inverse Optimal Control
UIUC
UIUC
NSA SoS Lablets Materials
Theoretical Foundations of Threat Assessment by Inverse Optimal Control
biblio
Learning Impedance Controller Parameters for Lower-Limb Prostheses
Submitted by awhitesell on Fri, 02/10/2017 - 12:36pm
Science of Security
NSA SoS Lablets Materials
Science of Security
Theoretical Foundations of Threat Assessment by Inverse Optimal Control
UIUC
UIUC
NSA SoS Lablets Materials
Theoretical Foundations of Threat Assessment by Inverse Optimal Control
file
Deceptive Routing Games
Submitted by awhitesell on Fri, 02/10/2017 - 12:19pm
game theory
jamming and security
NSA SoS Lablets Materials
relay networks
routing algorithms
Science of Security
Stackelberg equilibrium
Toward a Theory of Resilience in Systems: A Game-Theoretic Approach
UIUC
UIUC
NSA SoS Lablets Materials
Toward a Theory of Resilience in Systems: A Game-Theoretic Approach
biblio
Deceptive Routing in Relay Networks
Submitted by awhitesell on Fri, 02/10/2017 - 12:04pm
Science of Security
NSA SoS Lablets Materials
Science of Security
Toward a Theory of Resilience in Systems: A Game-Theoretic Approach
UIUC
game theory
Stackelberg equilibrium
routing algorithms
jamming and security
relay networks
UIUC
NSA SoS Lablets Materials
Toward a Theory of Resilience in Systems: A Game-Theoretic Approach
file
An Experiment Using Factor Graph for Early Attack Detection
Submitted by awhitesell on Fri, 02/10/2017 - 12:00pm
Science of Security
Science of Security
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
biblio
An Experiment Using Factor Graph for Early Attack Detection
Submitted by awhitesell on Fri, 02/10/2017 - 11:58am
Science of Security
Science of Security
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
file
Decentralized Control of Linear Switched Nested Systems With l2 Induced Norm Performance
Submitted by awhitesell on Thu, 02/09/2017 - 5:58pm
Science of Security
Science of Security
UIUC
NSA SoS Lablets Materials
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
biblio
Decentralized Control of Linear Switched Nested Systms With l2-Induced Norm Performance
Submitted by awhitesell on Thu, 02/09/2017 - 5:54pm
Science of Security
Science of Security
UIUC
NSA SoS Lablets Materials
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
file
An Experiment Using Factor Graph for Early Attack Detection
Submitted by awhitesell on Thu, 02/09/2017 - 5:45pm
Science of Security
UIUC
NSA SoS Lablets Materials
From Measurements to Security Science: Data-Driven Approach
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »