Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
NCSU Science of Security Lablet Research Initiative
Home
Projects
Past Projects
Researchers
Activity Stream
Members
Publications
Files
CPS-VO
»
Science of Security VO
»
NCSU Science of Security Lablet Research Initiative
» ACTIVITY STREAM
Activity Stream
Recent Posts
Node: Type
Biblio
Event
File
Forum topic
Group Project
NSF CPS Project
News Item
Online Meeting
Page
Panel
Tearline
Video
Webform
Wiki page
biblio
An Assessment of Security Problems in Open Source Software
Submitted by drwright on Thu, 10/08/2015 - 7:19pm
Resilience Requirements, Design, and Testing
Resilience Requirements, Design, and Testing
biblio
About PaaS Security
Submitted by vouk on Sun, 10/11/2015 - 12:53am
Metrics
NCSU
Resilient Architectures
Scalability and Composability
Vulnerability and Resilience Prediction Models
biblio
Directing Users’ Attention to Combat Phishing Attacks
Submitted by rproctor on Wed, 12/16/2015 - 5:31pm
A Human Information-Processing Analysis of Online Deception Detection
A Human Information-Processing Analysis of Online Deception Detection
biblio
Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty
Submitted by Huaiyu on Tue, 12/22/2015 - 3:41pm
game theory
IDS Configuration
Systematization of Knowledge from Intrusion Detection Models
Systematization of Knowledge from Intrusion Detection Models
biblio
Property-Based Verification of Evolving ddd Petri Nets
Submitted by ealshaer on Tue, 12/29/2015 - 5:06am
Automated Synthesis of Resilient Architectures
Automated Synthesis of Resilient Architectures
biblio
The social engineering behind phishing
Submitted by emerson on Sat, 01/09/2016 - 7:42am
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
file
TNW_21-1_2015_Article6.pdf
Submitted by emerson on Sat, 01/09/2016 - 7:42am
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
biblio
Using redundancy to detect security anomalies: towards IoT security attack detectors
Submitted by vouk on Mon, 01/11/2016 - 3:58am
Vulnerability and Resilience Prediction Models
Vulnerability and Resilience Prediction Models
biblio
The Role of Human Factors/Ergonomics in the Science of Security: Decision Making and Action Selection in Cyberspace
Submitted by drwright on Wed, 05/04/2016 - 9:01am
A Human Information-Processing Analysis of Online Deception Detection
human information processing
information security
privacy
risk communication
risk perception
file
0018720815585906.full_.pdf
Submitted by drwright on Wed, 05/04/2016 - 9:01am
A Human Information-Processing Analysis of Online Deception Detection
human information processing
information security
privacy
risk communication
risk perception
A Human Information-Processing Analysis of Online Deception Detection
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »