0 items selected.
Select all items:
|
| 12 SoS Quarterly Meeting July2016 Xie.pdf | File | awhitesell | Oct 24 2016 - 3:23pm | Yes | Yes | | |
| User-Centric Mobile Security Assessment | Biblio | awhitesell | Oct 24 2016 - 3:23pm | Yes | Yes | | |
| Beliefs about Cybersecurity Rules and Passwords A Comparison of Two Survey Samples | File | awhitesell | Oct 24 2016 - 3:12pm | Yes | Yes | | |
| Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users | Biblio | awhitesell | Oct 24 2016 - 3:12pm | Yes | Yes | | |
| 15 SoS Quarterly Meeting July2016 Iyer.pdf | File | awhitesell | Oct 24 2016 - 2:56pm | Yes | Yes | | |
| Detection of Malicious Keyloggers in Virtual Desktop Environments | Biblio | awhitesell | Oct 24 2016 - 2:56pm | Yes | Yes | | |
| 06 SoS Quarterly Meeting July2016 Sanders.pdf | File | awhitesell | Oct 24 2016 - 2:48pm | Yes | Yes | | |
| ADVISE – Adversary View Security Evaluation: Practical Metrics for Enterprise Security Engineering (poster) | Biblio | awhitesell | Oct 24 2016 - 2:48pm | Yes | Yes | | |
| 02 SoS Quarterly Meeting July2016 Viswanath.pdf | File | awhitesell | Oct 24 2016 - 2:41pm | Yes | Yes | | |
| Metadata-conscious Anonymous Messaging | Biblio | awhitesell | Oct 24 2016 - 2:41pm | Yes | Yes | | |
| Bounded Invariant Verification for Time-delayed Nonlinear Networked Dyanmical Systems | File | awhitesell | Jul 13 2016 - 2:24pm | Yes | Yes | | |
| Bounced Invariant Verification for Time-delayed Nonlinear Networked Dynamical Systems | Biblio | awhitesell | Jul 13 2016 - 2:24pm | Yes | Yes | | |
| DSSnet: A Smart Grid Modeling Platform Combining Electrical Power Distribution System Simulation and Software Defined Networking | File | awhitesell | Jul 13 2016 - 2:13pm | Yes | Yes | | |
| DSSnet: A Smart Grid Modeling Platform Combining Electrical Power Distribution System Simulation and Software Defined Networking Emulation (poster) | Biblio | awhitesell | Jul 13 2016 - 1:59pm | Yes | Yes | | |
| DSSnet: A Smart Grid Modeling Platform Combining Electrical Power Distribution System Simulation and Software Defined Networking | File | awhitesell | Jul 13 2016 - 1:59pm | Yes | Yes | | |
| A Study of Grayware on Google Play | Biblio | awhitesell | Jul 13 2016 - 1:44pm | Yes | Yes | | |
| A Study of Grayware on Google Play | File | awhitesell | Jul 13 2016 - 1:44pm | Yes | Yes | | |
| Measuring Code Behavioral Similarity for Programming and Software Engineering Education | File | awhitesell | Jul 13 2016 - 1:20pm | Yes | Yes | | |
| Measuring Code Behavioral Similarity for Programming and Software Engineering Education | Biblio | awhitesell | Jul 13 2016 - 1:20pm | Yes | Yes | | |
| Metadata-conscious Anonymous Messaging | File | awhitesell | Jul 13 2016 - 12:56pm | Yes | Yes | | |
| Metadata-conscious Anonymous Messaging | Biblio | awhitesell | Jul 13 2016 - 12:56pm | Yes | Yes | | |
| Rumor Source Obfuscation on Irregular Trees | File | awhitesell | Jul 13 2016 - 12:49pm | Yes | Yes | | |
| Ravel A Database Defined Network | File | awhitesell | Apr 12 2016 - 2:49pm | Yes | Yes | | |
| Ravel: A Database-Defined Network | Biblio | awhitesell | Apr 12 2016 - 2:46pm | Yes | Yes | | |
| Parallel Simulation and Virtual Machine Based Emulation of Software Defined Networks | File | awhitesell | Apr 12 2016 - 2:40pm | Yes | Yes | | |
| Parallel Simulation and Virtual-machine-based Emulation of Software-defined Network | Biblio | awhitesell | Apr 12 2016 - 2:40pm | Yes | Yes | | |
| SoSSDN 2016 - Artifacts Available Now | Event | awhitesell | Apr 1 2016 - 2:08pm | Yes | Yes | | |
| Science of Security for Cyber-Physical Systems Workshop | Event | awhitesell | Jan 15 2016 - 12:47pm | Yes | Yes | | |
| Preemptive Intrusion Detection Theoretical Framework and Real-World Measurements | File | amyclay | Nov 18 2015 - 2:17pm | Yes | Yes | | |
| Preemptive Intrusion Detection: Theoretical Framework and Real-World Measurements | Biblio | amyclay | Nov 18 2015 - 2:17pm | Yes | Yes | | |
| Differentially Private Distributed Optimization | File | amyclay | Nov 17 2015 - 5:40pm | Yes | Yes | | |
| Differentially Private Distributed Optimization | Biblio | amyclay | Nov 17 2015 - 5:40pm | Yes | Yes | | |
| Entropy-minimizing Mechanism for Differential Privacy of Discrete-time Linear Feedback Systems | Biblio | amyclay | Nov 17 2015 - 5:00pm | Yes | Yes | | |
| Entropy minimizing Mechanism for Differential Privacy of Discrete time Linear Feedback Systems | File | amyclay | Nov 17 2015 - 5:00pm | Yes | Yes | | |
| Simulation-based Verification of Cardiac Pacemakers with Guaranteed Coverage | File | amyclay | Nov 17 2015 - 2:40pm | Yes | Yes | | |
| Simulation-based Verification of Cardiac Pacemakers with Guaranteed Coverage | Biblio | amyclay | Nov 17 2015 - 2:40pm | Yes | Yes | | |
| Controller Synthesis for Linear Time-varying Systems with Adversaries | File | amyclay | Nov 17 2015 - 2:28pm | Yes | Yes | | |
| Controller Synthesis for Linear Time-varying Systems with Adversaries | Biblio | amyclay | Nov 17 2015 - 2:28pm | Yes | Yes | | |
| User-aware privacy control via extended static-information-flow analysis | File | amyclay | Nov 17 2015 - 11:15am | Yes | Yes | | |
| User-Aware Privacy Control via Extended Static-Information-Flow Analysis | Biblio | amyclay | Nov 17 2015 - 11:15am | Yes | Yes | | |
| AppContext: Differentiating Malicious and Benign Mobile App Behavior Under Context | Biblio | amyclay | Nov 17 2015 - 10:58am | Yes | Yes | | |
| AppContext Differentiating Malicious and Benighn Mobile App Behaviors Using Context | File | amyclay | Nov 17 2015 - 10:58am | Yes | Yes | | |
| Gamifying Software Security Education and Training via Secure Coding Duels in Code Hunt | Biblio | amyclay | Nov 17 2015 - 10:46am | Yes | Yes | | |
| Gamifying Softwre Security Education and Training via Secure Codeing Duels in Code Hunt Poster Abstract | File | amyclay | Nov 17 2015 - 10:46am | Yes | Yes | | |
| Mismorphism: A Semiotic Model of Computer Security Circumvention (poster abstract) | Biblio | amyclay | Nov 17 2015 - 10:36am | Yes | Yes | | |
| Mismorphism: a Semiotic Model of Computer Security Circumvention Poster Abstract | File | amyclay | Nov 17 2015 - 10:36am | Yes | Yes | | |
| Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent Based Modeling | Biblio | amyclay | Nov 16 2015 - 5:41pm | Yes | Yes | | |
| Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based Modeling | File | amyclay | Nov 16 2015 - 5:41pm | Yes | Yes | | |
| Mismorphism: A Semiotic Model of Computer Security Circumvention | Biblio | amyclay | Nov 16 2015 - 5:35pm | Yes | Yes | | |
| Mismorphism: a Semiotic Model of Computer Security Circumvention | File | amyclay | Nov 16 2015 - 5:35pm | Yes | Yes | | |
| Dynamic VM Dependability Monitoring Using Hypervisor Probes | Biblio | amyclay | Nov 16 2015 - 5:12pm | Yes | Yes | | |
| Dynamic VM Dependability Monitoring Using Hypervisor Probes | File | amyclay | Nov 16 2015 - 5:12pm | Yes | Yes | | |
| Towards an Unified Security Testbed and Security Analytics Framework | Biblio | amyclay | Nov 16 2015 - 5:04pm | Yes | Yes | | |
| Towards an Unified Security Testbed and Security Analytics Framework | File | amyclay | Nov 16 2015 - 5:04pm | Yes | Yes | | |
| Hypervisor Introspection Exploiting Timing Side channels against VM Monitoring | File | amyclay | Nov 16 2015 - 4:58pm | Yes | Yes | | |
| Hypervisor Introspection: Exploiting Timing Side-Channels against VM Monitoring | Biblio | amyclay | Nov 16 2015 - 4:58pm | Yes | Yes | | |
| Reliability and Security Monitoring of Virtual Machines using Hardware Architectural Invariants | File | amyclay | Nov 16 2015 - 4:32pm | Yes | Yes | | |
| Reliability and Security Monitoring of Virtual Machines using Hardware Architectural Invariants | Biblio | amyclay | Nov 16 2015 - 4:30pm | Yes | Yes | | |
| Building Reliable and Secure Virtual Machines using Architectural Invariants | File | amyclay | Nov 16 2015 - 4:22pm | Yes | Yes | | |
| Building Reliable and Secure Virtual Machines using Architectural Invariants | Biblio | amyclay | Nov 16 2015 - 4:22pm | Yes | Yes | | |
| Resiliency Variance in Workflows with Choice | File | amyclay | Nov 11 2015 - 5:45pm | Yes | Yes | | |
| Resiliency Variance in Workflows with Choice | Biblio | amyclay | Nov 11 2015 - 5:45pm | Yes | Yes | | |
| Impact of Policy Design on Workflow Resiliency Computation Time | File | amyclay | Nov 11 2015 - 5:38pm | Yes | Yes | | |
| Impact of Policy Design on Workflow Resiliency Computation Time | Biblio | amyclay | Nov 11 2015 - 5:38pm | Yes | Yes | | |
| Modelling User Availablity in Workflow Resiliency Analysis | File | amyclay | Nov 11 2015 - 5:26pm | Yes | Yes | | |
| Modelling User Availability in Workflow Resiliency Analysis | Biblio | amyclay | Nov 11 2015 - 5:26pm | Yes | Yes | | |
| On Massively Parallel Simulation of Large-Scale Fat-Tree Networks for HPC Systems and Data Centers | File | amyclay | Nov 11 2015 - 5:12pm | Yes | Yes | | |
| On Massively Parallel Simulation of Large-Scale Fat-Tree Networks for HPC Systems and Data Centers (poster) | Biblio | amyclay | Nov 11 2015 - 5:07pm | Yes | Yes | | |
| VT-Mininet Vitual-time-enabled Mininet for Scalable and Accurate Software-Define Network Emulation | File | amyclay | Nov 11 2015 - 4:49pm | Yes | Yes | | |
| VT-Miniet: Virtual-time-enabled Mininet for Scalable and Accurate Software-Define Network Emulation | Biblio | amyclay | Nov 11 2015 - 4:49pm | Yes | Yes | | |
| FatTreeSim: Modeling Large-scale,Fat-Tree Networks for HPC Systems and Data Centers Using Parallel and Discrete Event Simulation | File | amyclay | Nov 11 2015 - 3:23pm | Yes | Yes | | |
| FatTreeSim: Modeling a Large-scale Fat-Tree Network for HPC Systems and Data Centers Using Parallel and Discrete Even Simulation | Biblio | amyclay | Nov 11 2015 - 3:23pm | Yes | Yes | | |
| A Virtual Time System for Linux-container-based Emulation of Software-defined Networks | File | amyclay | Nov 11 2015 - 3:06pm | Yes | Yes | | |
| A Virtual Time System for Linux-container-based Emulation of Software-defined Networks | Biblio | awhitesell | Nov 11 2015 - 3:06pm | Yes | Yes | | |
| Enforcing Customizable Consistency Properties in Software-Defined Networks | File | awhitesell | Nov 11 2015 - 2:41pm | Yes | Yes | | |
| Enforcing Customizable Consistency Properties in Software-Defined Networks | Biblio | awhitesell | Nov 11 2015 - 2:41pm | Yes | Yes | | |
| Securing Industrial Control Systems with a Simulation-based Verification System | Biblio | awhitesell | Jan 13 2015 - 11:36am | Yes | Yes | | |
| Towards Correct Network Virtualization | Biblio | awhitesell | Jan 13 2015 - 11:19am | Yes | Yes | | |
| Static Dynamic Analysis of Security Metrics for Cyberphysical Systems | File | mitras | Oct 30 2014 - 12:51pm | Yes | Yes | | |
| Agent-based Modeling of User Circumvention of Security | Biblio | Katie Dey | Oct 24 2014 - 11:51am | Yes | Yes | | |
| Science of Human Circumvention of Security | Group Project | mitras | Oct 23 2014 - 12:31pm | Yes | Yes | | |
| A Hypothesis Testing Framework for Network Security | Group Project | Matt Caesar | Oct 23 2014 - 12:29pm | Yes | Yes | | |
| Data Driven Security Models and Analysis | Group Project | Zbigniew Kalbarczyk | Oct 23 2014 - 12:09pm | Yes | Yes | | |
| Data-Driven Model-Based Decision-Making | Group Project | David Nicol | Oct 23 2014 - 12:03pm | Yes | Yes | | |
| Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems | Group Project | Geir Dullerud | Oct 22 2014 - 1:25pm | Yes | Yes | | |
| Personalized Password Guessing: A New Security Threat | Biblio | Zbigniew Kalbarczyk | Sep 17 2014 - 5:31pm | Yes | Yes | | |
| Preemptive Intrusion Detection | Biblio | Zbigniew Kalbarczyk | Sep 17 2014 - 5:31pm | Yes | Yes | | |
| Proving Abstractions of Dynamical Systems Through Numerical Simulations | Biblio | mitras | Sep 17 2014 - 5:31pm | Yes | Yes | | |
| Quantitative Security Metrics for Cyber-Human Systems | Group Project | Heather Lucas | Nov 9 2012 - 7:47pm | Yes | Yes | | |
| Trust from Explicit Evidence: Integrating Digital Signatures and Formal Proofs | Group Project | Heather Lucas | Nov 9 2012 - 7:18pm | Yes | Yes | | |
| Towards a Science of Securing Network Forwarding | Group Project | Heather Lucas | Nov 9 2012 - 7:17pm | Yes | Yes | | |
| Toward a Theory of Resilience in Systems: A Game-Theoretic Approach | Group Project | Heather Lucas | Nov 9 2012 - 7:16pm | Yes | Yes | | |
| Theoretical Foundations of Threat Assessment by Inverse Optimal Control | Group Project | Heather Lucas | Nov 9 2012 - 7:14pm | Yes | Yes | | |
| Secure Platforms via Stochastic Computing | Group Project | Heather Lucas | Nov 9 2012 - 7:13pm | Yes | Yes | | |
| The Science of Summarizing Systems: Generating Security Properties Using Data Mining and Formal Analysis | Group Project | Heather Lucas | Nov 9 2012 - 7:12pm | Yes | Yes | | |
| Scalable Methods for Security Against Distributed Attacks | Group Project | Heather Lucas | Nov 9 2012 - 7:11pm | Yes | Yes | | |
| Quantitative Assessment of Access Control in Complex Distributed Systems | Group Project | Heather Lucas | Nov 9 2012 - 7:10pm | Yes | Yes | | |
| Protocol Verification: Beyond Reachability Properties | Group Project | Heather Lucas | Nov 9 2012 - 7:09pm | Yes | Yes | | |
| From Measurements to Security Science: Data-Driven Approach | Group Project | Heather Lucas | Nov 9 2012 - 7:08pm | Yes | Yes | | |
| Enhancing Cyber Security Through Networks Resilient to Targeted Attacks | Group Project | Heather Lucas | Nov 9 2012 - 7:07pm | Yes | Yes | | |