Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Academia
The document was issued by academy or academy organization.
file
Tutorial: Understanding and Accounting for Human Behavior
Submitted by jimblythe on Wed, 04/29/2015 - 10:32am. Contributors:
Jim Blythe
Sean Smith
Science of Security
Foundations
Human behavior
ethnography
cognitive bias
Access Control
HotSoS 2015
Academia
Presentation
Tutorials
file
Tutorial: Social Network Analysis for Science of Security
Submitted by kathleen.carley on Wed, 04/29/2015 - 10:31am. Contributor:
Kathleen Carley
Dr.
Science of Security
Foundations
insider threat
social networks
HotSoS 2015
Academia
Presentation
Tutorials
file
Keynote: The Importance of Measurement and Decision Making to a Science of Security
Submitted by PMcDaniel on Wed, 04/29/2015 - 10:28am. Contributor:
Patrick McDaniel
Science of Security
Foundations
Agility
Decision Making
Measurement
HotSoS 2015
Academia
Presentation
Presentations
file
Is It Science or Engineering? A Sampling of Recent Research
Submitted by reiter on Wed, 04/29/2015 - 10:26am. Contributor:
Michael Reiter
Keynote presentation at the 2015 Symposium and Bootcamp on the Science of Security.
Science of Security
Foundations
Engineering
science
HotSoS 2015
Academia
Presentation
Presentations
file
Memory Trace Oblivious Program Execution for Cloud Computing
Submitted by changliu on Wed, 04/29/2015 - 10:22am. Contributors:
Chang Liu
Michael Hicks
Elain Shi
Austin Harris
Martin Maas
Mohit Tiwari
Science of Security
Foundations
Cloud Computing
privacy
crypto
PL
HotSoS 2015
Academia
Presentation
Presentations
file
An Empirical Study of Global Malware Encounters
Submitted by kathleen.carley on Wed, 04/29/2015 - 10:19am. Contributors:
Ghita Mezzour
Kathleen Carley
L. Richard Carley
Science of Security
Foundations
malware
HotSoS 2015
Academia
Presentation
Presentations
file
Enabling Forensics by Proposing Heuristics to Identify Mandatory Log Events
Submitted by Laurie Williams on Wed, 04/29/2015 - 10:18am. Contributors:
Jason King
Rahul Pandita
Laurie Williams
Science of Security
Foundations
privacy
Forensics
Heuristics
HotSoS 2015
Academia
Presentation
Presentations
file
Preemptive Intrusion Detection: Theoretical Framework and Real-world Measurements
Submitted by Ravi Iyer on Wed, 04/29/2015 - 10:17am. Contributors:
Phuong Cao
Eric Badger
Zbigniew Kalbarczyk
Ravishankar Iyer
Adam Slagell
Science of Security
Foundations
Intrusion Detection
HotSoS 2015
Academia
Presentation
Presentations
file
Challenges with Applying Vulnerability Prediction Models
Submitted by Laurie Williams on Wed, 04/29/2015 - 10:16am. Contributors:
Patrick Morrison
Kim Herzig
Brendan Murphy
Laurie Williams
Testing
Modeling
Science of Security
Validation and Verification
Foundations
Metrics
vulnerability prediction models
Academia
Industry
Presentation
Presentations
file
An Integrated Cognitive Task Analysis Method for Tracing Human Analysts' Cyber Security Analysis Processes
Submitted by erbacher on Wed, 04/29/2015 - 10:15am. Contributors:
Chen Zhong
John Yen
Peng Liu
Rob Erbacher
Renee Etoty
Christopher Garneau
Science of Security
Foundations
Human Analysts
Defense Technologies
HotSoS 2015
Academia
Presentation
Presentations
« first
‹ previous
…
48
49
50
51
52
53
54
55
56
…
next ›
last »