Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
NCSU Science of Security Lablet Research Initiative
Home
Projects
Past Projects
Researchers
Activity Stream
Members
Publications
Files
CPS-VO
»
Science of Security VO
»
NCSU Science of Security Lablet Research Initiative
» ACTIVITY STREAM
Activity Stream
Recent Posts
Node: Type
Biblio
Event
File
Forum topic
Group Project
NSF CPS Project
News Item
Online Meeting
Page
Panel
Tearline
Video
Webform
Wiki page
biblio
Use of Warnings for Instructing Users How to Detect Phishing Webpages
Submitted by rproctor on Thu, 01/05/2017 - 7:45pm
A Human Information-Processing Analysis of Online Deception Detection
Human behavior
NCSU
Oct'16
A Human Information-Processing Analysis of Online Deception Detection
biblio
Understanding Sharing Policies in Multiparty Scenarios: Incorporating Context, Preferences, and Arguments into Decision Making
Submitted by mpsingh on Mon, 01/09/2017 - 4:47am
Formal Specification and Analysis of Security-Critical Norms and Policies
Human behavior
Jan'17
NCSU
Oct'16
Support, and Other Projects
Formal Specification and Analysis of Security-Critical Norms and Policies
biblio
Assessing Run-time Overhead of Securing Kepler
Submitted by vouk on Mon, 01/09/2017 - 4:15pm
biblio
Is domain highlighting actually helpful in identifying phishing webpages?
Submitted by rproctor on Sat, 04/01/2017 - 5:14pm
A Human Information-Processing Analysis of Online Deception Detection
Cybersecurity
Decision Making
information processing
Phishing
warnings
A Human Information-Processing Analysis of Online Deception Detection
biblio
Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment
Submitted by rproctor on Sat, 04/01/2017 - 5:25pm
A Human Information-Processing Analysis of Online Deception Detection
phishing; field study; active warning
A Human Information-Processing Analysis of Online Deception Detection
biblio
Flow reconnaissance via timing attacks on SDN switches
Submitted by reiter on Thu, 04/06/2017 - 10:22pm
biblio
On the Tradeoff between Privacy and Utility in Collaborative Intrusion Detection Networks - A Game Theoretical Approach
Submitted by Huaiyu on Fri, 04/07/2017 - 4:32pm
Systematization of Knowledge from Intrusion Detection Models
Systematization of Knowledge from Intrusion Detection Models
file
HotSoS17Tradeoff_final.pdf
Submitted by Huaiyu on Fri, 04/07/2017 - 4:32pm
Systematization of Knowledge from Intrusion Detection Models
Systematization of Knowledge from Intrusion Detection Models
biblio
Is domain highlighting actually helpful in identifying phishing webpages?
Submitted by rproctor on Sat, 04/08/2017 - 5:30pm
Cybersecurity
Decision Making
information processing
Phishing
Round 2 Projects
warnings
Round 2 Projects
file
p13-Burcham.pdf
Submitted by drwright on Mon, 04/10/2017 - 2:56pm
Science of Security
Literature Review
Science of Security
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »