0 items selected.
Select all items:
|
| 12 SoS Quarterly Meeting July2016 Xie.pdf | File | awhitesell | Oct 24 2016 - 4:23pm | Yes | Yes | | |
| User-Centric Mobile Security Assessment | Biblio | awhitesell | Oct 24 2016 - 4:23pm | Yes | Yes | | |
| Beliefs about Cybersecurity Rules and Passwords A Comparison of Two Survey Samples | File | awhitesell | Oct 24 2016 - 4:12pm | Yes | Yes | | |
| Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users | Biblio | awhitesell | Oct 24 2016 - 4:12pm | Yes | Yes | | |
| 15 SoS Quarterly Meeting July2016 Iyer.pdf | File | awhitesell | Oct 24 2016 - 3:56pm | Yes | Yes | | |
| Detection of Malicious Keyloggers in Virtual Desktop Environments | Biblio | awhitesell | Oct 24 2016 - 3:56pm | Yes | Yes | | |
| 06 SoS Quarterly Meeting July2016 Sanders.pdf | File | awhitesell | Oct 24 2016 - 3:48pm | Yes | Yes | | |
| ADVISE – Adversary View Security Evaluation: Practical Metrics for Enterprise Security Engineering (poster) | Biblio | awhitesell | Oct 24 2016 - 3:48pm | Yes | Yes | | |
| 02 SoS Quarterly Meeting July2016 Viswanath.pdf | File | awhitesell | Oct 24 2016 - 3:41pm | Yes | Yes | | |
| Metadata-conscious Anonymous Messaging | Biblio | awhitesell | Oct 24 2016 - 3:41pm | Yes | Yes | | |
| Bounded Invariant Verification for Time-delayed Nonlinear Networked Dyanmical Systems | File | awhitesell | Jul 13 2016 - 3:24pm | Yes | Yes | | |
| Bounced Invariant Verification for Time-delayed Nonlinear Networked Dynamical Systems | Biblio | awhitesell | Jul 13 2016 - 3:24pm | Yes | Yes | | |
| DSSnet: A Smart Grid Modeling Platform Combining Electrical Power Distribution System Simulation and Software Defined Networking | File | awhitesell | Jul 13 2016 - 3:13pm | Yes | Yes | | |
| DSSnet: A Smart Grid Modeling Platform Combining Electrical Power Distribution System Simulation and Software Defined Networking Emulation (poster) | Biblio | awhitesell | Jul 13 2016 - 2:59pm | Yes | Yes | | |
| DSSnet: A Smart Grid Modeling Platform Combining Electrical Power Distribution System Simulation and Software Defined Networking | File | awhitesell | Jul 13 2016 - 2:59pm | Yes | Yes | | |
| A Study of Grayware on Google Play | Biblio | awhitesell | Jul 13 2016 - 2:44pm | Yes | Yes | | |
| A Study of Grayware on Google Play | File | awhitesell | Jul 13 2016 - 2:44pm | Yes | Yes | | |
| Measuring Code Behavioral Similarity for Programming and Software Engineering Education | File | awhitesell | Jul 13 2016 - 2:20pm | Yes | Yes | | |
| Measuring Code Behavioral Similarity for Programming and Software Engineering Education | Biblio | awhitesell | Jul 13 2016 - 2:20pm | Yes | Yes | | |
| Metadata-conscious Anonymous Messaging | File | awhitesell | Jul 13 2016 - 1:56pm | Yes | Yes | | |
| Metadata-conscious Anonymous Messaging | Biblio | awhitesell | Jul 13 2016 - 1:56pm | Yes | Yes | | |
| Rumor Source Obfuscation on Irregular Trees | File | awhitesell | Jul 13 2016 - 1:49pm | Yes | Yes | | |
| Ravel A Database Defined Network | File | awhitesell | Apr 12 2016 - 3:49pm | Yes | Yes | | |
| Ravel: A Database-Defined Network | Biblio | awhitesell | Apr 12 2016 - 3:46pm | Yes | Yes | | |
| Parallel Simulation and Virtual Machine Based Emulation of Software Defined Networks | File | awhitesell | Apr 12 2016 - 3:40pm | Yes | Yes | | |
| Parallel Simulation and Virtual-machine-based Emulation of Software-defined Network | Biblio | awhitesell | Apr 12 2016 - 3:40pm | Yes | Yes | | |
| SoSSDN 2016 - Artifacts Available Now | Event | awhitesell | Apr 1 2016 - 3:08pm | Yes | Yes | | |
| Science of Security for Cyber-Physical Systems Workshop | Event | awhitesell | Jan 15 2016 - 1:47pm | Yes | Yes | | |
| Preemptive Intrusion Detection Theoretical Framework and Real-World Measurements | File | amyclay | Nov 18 2015 - 3:17pm | Yes | Yes | | |
| Preemptive Intrusion Detection: Theoretical Framework and Real-World Measurements | Biblio | amyclay | Nov 18 2015 - 3:17pm | Yes | Yes | | |
| Differentially Private Distributed Optimization | File | amyclay | Nov 17 2015 - 6:40pm | Yes | Yes | | |
| Differentially Private Distributed Optimization | Biblio | amyclay | Nov 17 2015 - 6:40pm | Yes | Yes | | |
| Entropy-minimizing Mechanism for Differential Privacy of Discrete-time Linear Feedback Systems | Biblio | amyclay | Nov 17 2015 - 6:00pm | Yes | Yes | | |
| Entropy minimizing Mechanism for Differential Privacy of Discrete time Linear Feedback Systems | File | amyclay | Nov 17 2015 - 6:00pm | Yes | Yes | | |
| Simulation-based Verification of Cardiac Pacemakers with Guaranteed Coverage | File | amyclay | Nov 17 2015 - 3:40pm | Yes | Yes | | |
| Simulation-based Verification of Cardiac Pacemakers with Guaranteed Coverage | Biblio | amyclay | Nov 17 2015 - 3:40pm | Yes | Yes | | |
| Controller Synthesis for Linear Time-varying Systems with Adversaries | File | amyclay | Nov 17 2015 - 3:28pm | Yes | Yes | | |
| Controller Synthesis for Linear Time-varying Systems with Adversaries | Biblio | amyclay | Nov 17 2015 - 3:28pm | Yes | Yes | | |
| User-aware privacy control via extended static-information-flow analysis | File | amyclay | Nov 17 2015 - 12:15pm | Yes | Yes | | |
| User-Aware Privacy Control via Extended Static-Information-Flow Analysis | Biblio | amyclay | Nov 17 2015 - 12:15pm | Yes | Yes | | |
| AppContext: Differentiating Malicious and Benign Mobile App Behavior Under Context | Biblio | amyclay | Nov 17 2015 - 11:58am | Yes | Yes | | |
| AppContext Differentiating Malicious and Benighn Mobile App Behaviors Using Context | File | amyclay | Nov 17 2015 - 11:58am | Yes | Yes | | |
| Gamifying Software Security Education and Training via Secure Coding Duels in Code Hunt | Biblio | amyclay | Nov 17 2015 - 11:46am | Yes | Yes | | |
| Gamifying Softwre Security Education and Training via Secure Codeing Duels in Code Hunt Poster Abstract | File | amyclay | Nov 17 2015 - 11:46am | Yes | Yes | | |
| Mismorphism: A Semiotic Model of Computer Security Circumvention (poster abstract) | Biblio | amyclay | Nov 17 2015 - 11:36am | Yes | Yes | | |
| Mismorphism: a Semiotic Model of Computer Security Circumvention Poster Abstract | File | amyclay | Nov 17 2015 - 11:36am | Yes | Yes | | |
| Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent Based Modeling | Biblio | amyclay | Nov 16 2015 - 6:41pm | Yes | Yes | | |
| Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based Modeling | File | amyclay | Nov 16 2015 - 6:41pm | Yes | Yes | | |
| Mismorphism: A Semiotic Model of Computer Security Circumvention | Biblio | amyclay | Nov 16 2015 - 6:35pm | Yes | Yes | | |
| Mismorphism: a Semiotic Model of Computer Security Circumvention | File | amyclay | Nov 16 2015 - 6:35pm | Yes | Yes | | |
| Dynamic VM Dependability Monitoring Using Hypervisor Probes | Biblio | amyclay | Nov 16 2015 - 6:12pm | Yes | Yes | | |
| Dynamic VM Dependability Monitoring Using Hypervisor Probes | File | amyclay | Nov 16 2015 - 6:12pm | Yes | Yes | | |
| Towards an Unified Security Testbed and Security Analytics Framework | Biblio | amyclay | Nov 16 2015 - 6:04pm | Yes | Yes | | |
| Towards an Unified Security Testbed and Security Analytics Framework | File | amyclay | Nov 16 2015 - 6:04pm | Yes | Yes | | |
| Hypervisor Introspection Exploiting Timing Side channels against VM Monitoring | File | amyclay | Nov 16 2015 - 5:58pm | Yes | Yes | | |
| Hypervisor Introspection: Exploiting Timing Side-Channels against VM Monitoring | Biblio | amyclay | Nov 16 2015 - 5:58pm | Yes | Yes | | |
| Reliability and Security Monitoring of Virtual Machines using Hardware Architectural Invariants | File | amyclay | Nov 16 2015 - 5:32pm | Yes | Yes | | |
| Reliability and Security Monitoring of Virtual Machines using Hardware Architectural Invariants | Biblio | amyclay | Nov 16 2015 - 5:30pm | Yes | Yes | | |
| Building Reliable and Secure Virtual Machines using Architectural Invariants | File | amyclay | Nov 16 2015 - 5:22pm | Yes | Yes | | |
| Building Reliable and Secure Virtual Machines using Architectural Invariants | Biblio | amyclay | Nov 16 2015 - 5:22pm | Yes | Yes | | |
| Resiliency Variance in Workflows with Choice | File | amyclay | Nov 11 2015 - 6:45pm | Yes | Yes | | |
| Resiliency Variance in Workflows with Choice | Biblio | amyclay | Nov 11 2015 - 6:45pm | Yes | Yes | | |
| Impact of Policy Design on Workflow Resiliency Computation Time | File | amyclay | Nov 11 2015 - 6:38pm | Yes | Yes | | |
| Impact of Policy Design on Workflow Resiliency Computation Time | Biblio | amyclay | Nov 11 2015 - 6:38pm | Yes | Yes | | |
| Modelling User Availablity in Workflow Resiliency Analysis | File | amyclay | Nov 11 2015 - 6:26pm | Yes | Yes | | |
| Modelling User Availability in Workflow Resiliency Analysis | Biblio | amyclay | Nov 11 2015 - 6:26pm | Yes | Yes | | |
| On Massively Parallel Simulation of Large-Scale Fat-Tree Networks for HPC Systems and Data Centers | File | amyclay | Nov 11 2015 - 6:12pm | Yes | Yes | | |
| On Massively Parallel Simulation of Large-Scale Fat-Tree Networks for HPC Systems and Data Centers (poster) | Biblio | amyclay | Nov 11 2015 - 6:07pm | Yes | Yes | | |
| VT-Mininet Vitual-time-enabled Mininet for Scalable and Accurate Software-Define Network Emulation | File | amyclay | Nov 11 2015 - 5:49pm | Yes | Yes | | |
| VT-Miniet: Virtual-time-enabled Mininet for Scalable and Accurate Software-Define Network Emulation | Biblio | amyclay | Nov 11 2015 - 5:49pm | Yes | Yes | | |
| FatTreeSim: Modeling Large-scale,Fat-Tree Networks for HPC Systems and Data Centers Using Parallel and Discrete Event Simulation | File | amyclay | Nov 11 2015 - 4:23pm | Yes | Yes | | |
| FatTreeSim: Modeling a Large-scale Fat-Tree Network for HPC Systems and Data Centers Using Parallel and Discrete Even Simulation | Biblio | amyclay | Nov 11 2015 - 4:23pm | Yes | Yes | | |
| A Virtual Time System for Linux-container-based Emulation of Software-defined Networks | File | amyclay | Nov 11 2015 - 4:06pm | Yes | Yes | | |
| A Virtual Time System for Linux-container-based Emulation of Software-defined Networks | Biblio | awhitesell | Nov 11 2015 - 4:06pm | Yes | Yes | | |
| Enforcing Customizable Consistency Properties in Software-Defined Networks | File | awhitesell | Nov 11 2015 - 3:41pm | Yes | Yes | | |
| Enforcing Customizable Consistency Properties in Software-Defined Networks | Biblio | awhitesell | Nov 11 2015 - 3:41pm | Yes | Yes | | |
| Securing Industrial Control Systems with a Simulation-based Verification System | Biblio | awhitesell | Jan 13 2015 - 12:36pm | Yes | Yes | | |
| Towards Correct Network Virtualization | Biblio | awhitesell | Jan 13 2015 - 12:19pm | Yes | Yes | | |
| Static Dynamic Analysis of Security Metrics for Cyberphysical Systems | File | mitras | Oct 30 2014 - 1:51pm | Yes | Yes | | |
| Agent-based Modeling of User Circumvention of Security | Biblio | Katie Dey | Oct 24 2014 - 12:51pm | Yes | Yes | | |
| Science of Human Circumvention of Security | Group Project | mitras | Oct 23 2014 - 1:31pm | Yes | Yes | | |
| A Hypothesis Testing Framework for Network Security | Group Project | Matt Caesar | Oct 23 2014 - 1:29pm | Yes | Yes | | |
| Data Driven Security Models and Analysis | Group Project | Zbigniew Kalbarczyk | Oct 23 2014 - 1:09pm | Yes | Yes | | |
| Data-Driven Model-Based Decision-Making | Group Project | David Nicol | Oct 23 2014 - 1:03pm | Yes | Yes | | |
| Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems | Group Project | Geir Dullerud | Oct 22 2014 - 2:25pm | Yes | Yes | | |
| Personalized Password Guessing: A New Security Threat | Biblio | Zbigniew Kalbarczyk | Sep 17 2014 - 6:31pm | Yes | Yes | | |
| Preemptive Intrusion Detection | Biblio | Zbigniew Kalbarczyk | Sep 17 2014 - 6:31pm | Yes | Yes | | |
| Proving Abstractions of Dynamical Systems Through Numerical Simulations | Biblio | mitras | Sep 17 2014 - 6:31pm | Yes | Yes | | |
| Quantitative Security Metrics for Cyber-Human Systems | Group Project | Heather Lucas | Nov 9 2012 - 8:47pm | Yes | Yes | | |
| Trust from Explicit Evidence: Integrating Digital Signatures and Formal Proofs | Group Project | Heather Lucas | Nov 9 2012 - 8:18pm | Yes | Yes | | |
| Towards a Science of Securing Network Forwarding | Group Project | Heather Lucas | Nov 9 2012 - 8:17pm | Yes | Yes | | |
| Toward a Theory of Resilience in Systems: A Game-Theoretic Approach | Group Project | Heather Lucas | Nov 9 2012 - 8:16pm | Yes | Yes | | |
| Theoretical Foundations of Threat Assessment by Inverse Optimal Control | Group Project | Heather Lucas | Nov 9 2012 - 8:14pm | Yes | Yes | | |
| Secure Platforms via Stochastic Computing | Group Project | Heather Lucas | Nov 9 2012 - 8:13pm | Yes | Yes | | |
| The Science of Summarizing Systems: Generating Security Properties Using Data Mining and Formal Analysis | Group Project | Heather Lucas | Nov 9 2012 - 8:12pm | Yes | Yes | | |
| Scalable Methods for Security Against Distributed Attacks | Group Project | Heather Lucas | Nov 9 2012 - 8:11pm | Yes | Yes | | |
| Quantitative Assessment of Access Control in Complex Distributed Systems | Group Project | Heather Lucas | Nov 9 2012 - 8:10pm | Yes | Yes | | |
| Protocol Verification: Beyond Reachability Properties | Group Project | Heather Lucas | Nov 9 2012 - 8:09pm | Yes | Yes | | |
| From Measurements to Security Science: Data-Driven Approach | Group Project | Heather Lucas | Nov 9 2012 - 8:08pm | Yes | Yes | | |
| Enhancing Cyber Security Through Networks Resilient to Targeted Attacks | Group Project | Heather Lucas | Nov 9 2012 - 8:07pm | Yes | Yes | | |