Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Academia
The document was issued by academy or academy organization.
file
An Analysis of Fedora Security Profile (poster)
Submitted by Laurie Williams on Wed, 06/04/2014 - 9:43am. Contributors:
Shweta Subramani
Mladen A. Vouk
Laurie A. Williams
Slides of the poster are available
here
.
Aleatoric
Attack Profile
epistemic
Non-Operational Testing
HotSoS 2014
Academia
Poster
Posters
Posters
file
Access Control Policy Evolution: An Empirical Study (poster)
Submitted by Laurie Williams on Wed, 06/04/2014 - 9:43am. Contributors:
JeeHyun Hwang
Laurie A. Williams
Mladen A. Vouk
Slides of the poster are available
here
.
Evolution
HotSoS 2014
Academia
Poster
Posters
Posters
Access Control
file
Understanding the 'H' in Science of Security HCI Research: Methods and Lessons Learned from Investigations of Phishing
Submitted by cmayhorn on Tue, 06/03/2014 - 5:35pm. Contributor:
Christopher B. Mayhorn, PhD
Human behavior
research methodology
HotSoS 2014
Academia
Presentations
Presentation Slides
Phishing
Human and Societal Aspects of Security and Privacy
file
Phishing In International Waters
Submitted by emerson on Tue, 06/03/2014 - 5:35pm. Contributors:
Emerson Murphy-Hill
Chris Mayhorn
Rucha Tembe
Olga Zielinska
Yuqi Liu
Kyung Wha Hong
Xi Ge
China
cultural differences
India
nationality
online privacy
susceptibility
HotSoS 2014
Academia
Presentations
Presentation Slides
Phishing
file
Proving Abstractions of Dynamical Systems Using Numerical Simulations
Submitted by mitras on Tue, 06/03/2014 - 5:35pm. Contributor:
Sayan Mitra
Simulation
abstraction
security
HotSoS 2014
Academia
Presentations
Presentation Slides
file
Open vs. Closed Systems for Accountability
Submitted by adj on Tue, 06/03/2014 - 5:35pm. Contributors:
Joan Feigenbaum
Aaron D. Jaggard
Rebecca N. Wright
accountability
anonymity
identity
open systems
utility theory
HotSoS 2014
Academia
Presentations
Presentation Slides
file
Log Your CRUD: Design Principles for Software Logging Mechanisms
Submitted by Laurie Williams on Tue, 06/03/2014 - 5:35pm. Contributors:
Jason King
Laurie Williams
audit
black-box evaluation
electronic health record
logging
nonrepudiaiton
user accountability
HotSoS 2014
Academia
Presentations
Presentation Slides
file
Limiting Recertification in Highly Configurable Systems (slides)
Submitted by Heather Lucas on Tue, 06/03/2014 - 5:35pm. Contributors:
Christian Kästner
Jürgen Pfeffer
Certification
configuration options
network analysis
HotSoS 2014
Academia
Poster Slides
Presentation Slides
Security Metrics
Network Security
Security Certification
file
In-Nimbo Sandboxing
Submitted by scherlis on Tue, 06/03/2014 - 5:35pm. Contributors:
Michael Maass
William L. Scherlis
Jonathan Aldrich
Cloud Computing
pdf security
sandboxing
structured evaluation
HotSoS 2014
Academia
Presentations
Presentation Slides
file
Less is More? Investigating the Role of Examples in Security Studies using Analogical Transfer
Submitted by Heather Lucas on Tue, 06/03/2014 - 5:35pm. Contributors:
Ashwini Rao
Hanan Hibshi
Travis Breaux
Jean-Michel Lehker
Jianwei Niu
Analogical Transfer
Examples
Security Studies
User experiments
HotSoS 2014
Academia
Presentations
Presentation Slides
« first
‹ previous
…
79
80
81
82
83
84
85
86
87
…
next ›
last »