Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
NCSU Science of Security Lablet Research Initiative
Home
Projects
Past Projects
Researchers
Activity Stream
Members
Publications
Files
CPS-VO
»
Science of Security VO
»
NCSU Science of Security Lablet Research Initiative
» ACTIVITY STREAM
Activity Stream
Recent Posts
Node: Type
Biblio
Event
File
Forum topic
Group Project
NSF CPS Project
News Item
Online Meeting
Page
Panel
Tearline
Video
Webform
Wiki page
biblio
PrIncipedia: A Privacy Incidents Encyclopedia
Submitted by Jessica Staddon on Fri, 10/07/2016 - 10:48am
Privacy Incidents Database
Redundancy for Network Intrusion Prevention Systems (NIPS)
Privacy Incidents Database
biblio
In Automation We Trust? Identifying Varying Levels of Trust in Human and Automated Information Sources
Submitted by cmayhorn on Fri, 10/07/2016 - 3:08pm
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
file
Pearson_et_al_2016.pdf
Submitted by cmayhorn on Fri, 10/07/2016 - 3:08pm
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
biblio
Human Subtlety Proofs: Using Computer Games to Model Cognitive Processes for Cybersecurity
Submitted by drwright on Tue, 10/11/2016 - 8:17pm
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
biblio
Assessing Run-time Overhead of Securing Kepler
Submitted by vouk on Tue, 10/11/2016 - 10:13pm
biblio
Securing Data Flows within Software Application Networks in Cloud Environments
Submitted by vouk on Tue, 10/11/2016 - 10:20pm
biblio
Kont: Computing Tradeoffs in Normative Multiagent Systems
Submitted by ozgurkafali on Tue, 12/27/2016 - 10:43am
biblio
How Good is a Security Policy against Real Breaches? A HIPAA Case Study
Submitted by ozgurkafali on Tue, 12/27/2016 - 10:45am
biblio
Is Domain Highlighting Actually Helpful in Identifying Phishing Webpages?
Submitted by rproctor on Thu, 01/05/2017 - 6:38pm
A Human Information-Processing Analysis of Online Deception Detection
Human behavior
NCSU
Oct'16
A Human Information-Processing Analysis of Online Deception Detection
biblio
Human Trust in Automation in a Phishing Context
Submitted by rproctor on Thu, 01/05/2017 - 6:43pm
A Human Information-Processing Analysis of Online Deception Detection
Human behavior
NCSU
Oct'16
A Human Information-Processing Analysis of Online Deception Detection
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
…
next ›
last »