Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
NCSU Science of Security Lablet Research Initiative
Home
Projects
Past Projects
Researchers
Activity Stream
Members
Publications
Files
CPS-VO
»
Science of Security VO
»
NCSU Science of Security Lablet Research Initiative
» ACTIVITY STREAM
Activity Stream
Recent Posts
Node: Type
Biblio
Event
File
Forum topic
Group Project
NSF CPS Project
News Item
Online Meeting
Page
Panel
Tearline
Video
Webform
Wiki page
biblio
Automated Attack Surface Approximation
Submitted by drwright on Wed, 05/04/2016 - 9:13am
attack surface
Attack Surface and Defense-in-Depth Metrics
crash dumps
Stack traces
Attack Surface and Defense-in-Depth Metrics
biblio
Gremlin: Systematic resilience testing of microservices
Submitted by reiter on Sun, 06/19/2016 - 11:34pm
Redundancy for Network Intrusion Prevention Systems (NIPS)
Redundancy for Network Intrusion Prevention Systems (NIPS)
biblio
Securing Software Application Chains in a Cloud
Submitted by vouk on Mon, 06/27/2016 - 6:11pm
Resilient Systems
Resilient Systems
Science of Security
validation and verification
Vulnerability and Resilience Prediction Models
Vulnerability and Resilience Prediction Models
biblio
Assessing Run-time Overhead of Securing Kepler
Submitted by vouk on Mon, 06/27/2016 - 6:16pm
biblio
JIVUI: JavaScript Interface for Visualization of User Interaction
Submitted by stamant on Wed, 06/29/2016 - 2:18pm
CPS Technologies
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
biblio
The Persuasive Phish: Examining the Social Psychological Principles Hidden in Phishing Emails
Submitted by drwright on Fri, 07/01/2016 - 1:34pm
Email
persuasion
Phishing
security
social engineering
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
file
p126-zielinska.pdf
Submitted by drwright on Fri, 07/01/2016 - 1:34pm
Email
persuasion
Phishing
security
social engineering
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
file
p95-pearson.pdf
Submitted by drwright on Fri, 07/01/2016 - 1:42pm
automation
decision-making
reliance
Risk
Strain
trust
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
workload
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
biblio
Differences in Trust Between Human and Automated Decision Aids
Submitted by drwright on Fri, 07/01/2016 - 1:42pm
automation
decision-making
reliance
Risk
Strain
trust
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
workload
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
biblio
Collaborative IDS Configuration: A Two-layer Game Approach
Submitted by Huaiyu on Mon, 09/26/2016 - 12:14pm
foundations
Systematization of Knowledge from Intrusion Detection Models
Systematization of Knowledge from Intrusion Detection Models
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »