Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
foundations
biblio
The Hedge Algorithm on a Continuum
Submitted by Katie Dey on Thu, 11/12/2015 - 12:37pm
Resilient Systems
Science of Security
Foundations
SURE Project
foundations
Hierarchical Coordination and Control
Resilient Systems
Science of decentralized security
Science of Security
Hierarchical Coordination and Control
Science of decentralized security
biblio
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels
Submitted by Katie Dey on Thu, 11/12/2015 - 12:25am
Resilient Systems
Science of Security
Foundations
SURE Project
aggregating labels
anti-virus vendors
expectation-maximization
foundations
Hierarchical Coordination and Control
labeling problem
Resilient Systems
Science of decentralized security
Science of Security
Hierarchical Coordination and Control
Science of decentralized security
biblio
Feature Cross-Substitution in Adversarial Classification
Submitted by Katie Dey on Tue, 03/03/2015 - 7:34pm
Resilient Systems
foundations
Resilient Systems
Science of Security
SURE Project
biblio
Multi-Defender Security Games on Networks
Submitted by Katie Dey on Tue, 03/03/2015 - 5:14pm
Resilient Systems
SURE Project
foundations
Resilient Systems
Science of Security
biblio
Efficient Complete Coverage Through Heterogeneous Sensing Nodes
Submitted by Katie Dey on Tue, 03/03/2015 - 5:06pm
Resilient Systems
Ad hoc networks
Complete coverage
covering density
foundations
Manganese
Measurement
Monitoring
Resilient Monitoring and Control
Resilient Systems
Science of Security
sensing cost
sensors
Wireless communication
wireless sensor networks
SURE Project
biblio
An Analysis of Fedora Security Profile
Submitted by vouk on Wed, 09/17/2014 - 6:32pm
Testing
Science of Security
Validation and Verification
Foundations
ACM CCS
cyber security
detection
Domain-Specific Security and Privacy Architectures
Fedora
Formal Methods and Theory of Security
foundations
Logic and Verification
Non-Operational Testing
prediction
Science of Security
security faults
Software and Application Security
testing
validation and verification
vulnerabilities
ACM CCS
Domain-Specific Security and Privacy Architectures
Cyber Security
Formal Methods and Theory of Security
Logic and Verification
Software and Application Security
biblio
Exploring Key-level Analytics for Computational Modeling of Typing Behavior
Submitted by robertsd@csc.ncsu... on Wed, 09/17/2014 - 6:32pm
Science of Security
Foundations
cognitive modeling
foundations
Human and Societal Aspects of Security and Privacy
Science of Security
Social Aspects of Security and Privacy
typing
user interfaces
Social Aspects of Security and Privacy
Human and Societal Aspects of Security and Privacy
biblio
Modeling and Sensing Risky User Behavior on Mobile Devices
Submitted by enck on Wed, 09/17/2014 - 6:32pm
Wireless Sensing and Actuation
Science of Security
CPS Technologies
Foundations
ACM CCS
CPS Technologies
cyber security
foundations
Human and Societal Aspects of Security and Privacy
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
mobile
Mobile and Wireless Security
network security
Science of Security
security
User behavior
wireless sensing and actuation
ACM CCS
Cyber Security
Intrusion Detection Systems
Mobile and Wireless Security
Human and Societal Aspects of Security and Privacy
Intrusion/Anomaly Detection and Malware Mitigation
Network Security
biblio
Improving Mobile Application Security via Bridging User Expectations and Application Behaviors
Submitted by xxiao007 on Wed, 09/17/2014 - 6:32pm
Control
Science of Security
Foundations
ACM CCS
control
foundations
Human and Societal Aspects of Security and Privacy
Mobile Platform Security
natural language processing
Operating systems security
Privacy Control
Science of Security
Social Aspects of Security and Privacy
Software and Application Security
Systems Security
ACM CCS
Mobile Platform Security
Social Aspects of Security and Privacy
Human and Societal Aspects of Security and Privacy
Software and Application Security
Operating Systems Security
Systems Security
biblio
Insecure Behaviors on Mobile Devices Under Stress
Submitted by enck on Wed, 09/17/2014 - 6:32pm
Science of Security
Foundations
ACM CCS
foundations
Human and Societal Aspects of Security and Privacy
information privacy
Mobile and Wireless Security
network security
Privacy Protections
Science of Security
ACM CCS
Information Privacy
Privacy Protections
Mobile and Wireless Security
Human and Societal Aspects of Security and Privacy
Network Security
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »