Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
Home
All
CMU
NCSU
UIUC
UMD
Publications
HSR Guidance
Logo Directory
Members
Files
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» BIBLIO
Biblio
List
Filter
Show only items where
Author
Type
Term
Year
Keyword
is
Anon
Acquisti, Alessandro
Adam Sales
Adam Wynne
Adwait Nadkarni
Ahmad Moghimi
Aiping Xiong
Akın Günay
Akond Rahman
Al-Shaer, Ehab
Al-Zyoud, Mahran
Alain Forget
Alan T. Sherman
Aldrich, Jonathan
Aleksander Essex
Alessandra Gorla
Alessandro Acquisti
Alex Davis
Alex Potanin
Ali Kheradmand, University of Illinois at Urbana-Champaign
Alireza Sadeghi
Allaire K. Welk
Alsaleh, Mohammed
Amit K. Chopra
Amit Vasudevan
Andre Platzer
Andrew Giang
Anronia Lopes
Antonia Lopes
Anup K. Kalia
Anupam Datta
Arbob Ahmad
Armando Rodriguez
Arnab Kumar
Ashwini Rao
Aviv, Adam
Aviv, Adam J
B. Murphy
Baldoino Fonseca
Balzer, Stephanie
Baruch Fischhoff
Basil Becker
Bauer, Lujo
Ben Blum
Benjamin Andow
Benjamin Chung
Bernardo Toninho
Blase Ur
Bo Zhang
Bobba, Rakesh B.
Bojan Cukic
Brad Myers
Bradley Schmerl
Breaux, Travis
Brendan Murphy
Brighten Godfrey, University of Illinois at Urbana-Champaign
Bruno Ferreira
Burcham, Morgan
C. Pearson
C. Theisen
Capell, Peter
Carley, Kathleen
Carley, L. Richard
Carver, Jeffrey C.
Casey Canfield
Charu Sharma
Chau, Duen Horng
Chenglong Wang
Chris Parnin
Christian Kästner
Christian Prehofer
Christian Wagner
Christin, Nicolas
Christopher B. Mayhorn
Christopher Bogart
Christopher Theisen
Chu-Pan Wong
Chung-Wei Hang
Chung, Benjamin
Claiborne Johnson
Claire Le Goues
Claus Hunsen
Coblenz, Michael
Cranor, Lorrie
Cyrus Omar
Dai, Huaiyu
Daniel Jackson
Daniel M. Best
Daniel Marino
Daniel Smullen
Danny Weyns
Darya Kurilova
Darya Melicher (Kurilova)
David Chaum
David Garlan
Dawid Gawel
Deepak Garg
Dennis Griffith, University of Illinois at Urbana-Champaign
Dennis Smith
Dio De Niz
Donghoo Kim
Du Li
Du, Hongying
Dumitras, Tudor
E. Murphy-Hill
Ebrahim Khalaj
Effat Farhana
Ehab Al-Shaer
Elena Peterson
Elsa Gunter, University of Illinois at Urbana-Champaign
Emerson Murphy-Hill
Emily Shen
Eric Walkingshaw
Eric Yuan
Erik Zawadzki
Esther Wang
Eunsuk Kang
Eyal Peer
Faloutsos, Christos
Ferdian Thung
Fichter, Dane
Filip Zagórski
Filipre Militao
Flavio Medeiros
Forget, Alain
Forrest Shull
Frank Pfenning
Fulton, Nathan
Gabor Karsai
Gabriel Ferreira
Gabriel Moreno
Gabriel Tamura
Garth Gibson
Ge, Xi
Geir Dullerud, University of Illinois at Urbana-Champaign
Geoffrey Gordon
Geoffrey Morgan
George F. List
Ghita Mezzour
Ghorbal, Khalil
Gilani, Fida
Gordon, Geoffrey
Gregg Rothermel
Gregor Engels
Gunter Saake
Hamid Bagheri
Hanan Hibshi
Hausi Muller
He, Xiaofan
Hemank Lamba
Herbsleb, James
Hibshi, Hanan
Holger Giese
Hong Jiang
Hong, K. W.
Hong, Kyung Wha
Hongying Du
Hua Wu
Hui Guo
Hui Shen
Ian Voysey
Ivan Ruchkin
J. Simons-Rodolph
Jackson Dinh
Jafar Al-Kofahi
Jaime S. Sichman
James Herbsleb
James Hester
Janet Siegmund
Janne Lindqvist
Jason Hickey
Jason Hong
Jason King
Jaspreet Bhatia
Javier Camara
Jean-Michel Lehker
Jeannin, Jean-Baptiste
Jeff Gennari
Jeff Kramer
Jeff Magee
Jeffery von Ronne
Jeffrey Barnes
Jeffrey Gennari
Jens Meinicke
Jeremy Clark
Jeremy Thomas
Jesper Andersson
Jessica Staddon
Jialiu Lin
Jiaming Jiang
Jiang, Jun
Jianwei Niu
Jin, Richeng
Jing Chen
Jiri Simsa
Joao Pedro Sousa
Jochen Wuttke
Joel Lee
Joel Reidenberg
John Myopoulos
John Slankas
John Wittrock
Jon Doyle
Jonathan Aldrich
Jonathan Shahen
Jorge Perez
Joseph Bonneau
Joseph Lee
Joshua Garcia
Joshua Sunshine
Joshua Tan
Joy Zhang
Ju-Sung Lee
Junjie Qian
Jurgen Pfeffer
Justin Pelletier, Nuthan Munaiah, Shau-Hsuan Su, S. Jay Yang, Andrew Meneely
K. Herzig
K. Oliver
Kaestner, Christian
Kafalı, Özgür
Karl Goschka
Karthik Sheshadari
Kartik Nayak
Kathleen Carley
Kelly, Patrick Gage
Kenny Wong
Kim Herzig
Kim, Donghoon
Komanduri, Saranga
Kristina Sojakova
Krzysztof Czarnecki
Kurilova, Darya
Kurt Geihs
Kyle Canavera
L. Richard Carley
L. Williams
Ladan Tahvildari
Laurie Williams
Lee, Da Young
Lee, Joel
Leeyat Slyper
Lehker, J.M.
Lehker, Jean-Michel
Lichao Sun
Ligia Nistor
Limin Jia
Liora Friedberg
Lorrie Cranor
Luciano Baresi
Luis Caires
Luis G. Nardin
Luiz Carvalho
Lujo Bauer
Maass, Michael
Maciej Kosarzecki
Magnus Egerstedt, University of Illinois at Urbana-Champaign
Mahesh Tripunitara
Mahmood, Riyadh
Mahmoud Hammad
Malek, Sam
Marcio Ribeiro
Maria Riaz
Marian Harbach
Marin Litoiu
Mark Appleby
Martin Becker
Marwan Abi-Antoun
Mary Shaw
Matthew Caesar, University of Illinois at Urbana-Champaign
Matthew Fredrikson
Matthew Hale, University of Illinois at Urbana-Champaign
Matthew Hammer
Mauro Pezze
Mayhorn, C. B.
Mayhorn, Christopher B.
Mazurek, Michelle
Meder, David
Mehdi Mashayekhi
Meng Meng
Mezzour, Ghita
Michael Coblenz
Michael Hilton
Michael K. Reiter
Michael Lanham
Michael Maass
Michelle L. Mazurek
Mirzaei, Nariman
Mitra Bokaei Hosseini
Mladen A. Vouk
Mladen Vouk
Mohammed Alsaleh
Momin Malik
Morgan Evans
Munindar P. Singh
Murphy-Hill, E.
Murphy-Hill, Emerson
Myers, Bradley
Naeem Esfahani
Nariman Mirzaei
Nathan Fulton
Nelly Bencomo
Nicholas Munson
Nicola Gambino
Nicolas Christin
Ning, Peng
Ninghui Li
Nirav Ajmeri
Nistor, Ligia
Niu, Jianwei
Norha Villegas
Norman Sadeh
Olaf Lebenich
Olga A. Zielinska
Omar, Cyrus
Oscar Nierstrasz
Ozgur Kafali
Pan Yi
Paola Inverardi
Papalexakis, Evangelos
Partho, Asif
Passaro, Timothy
Patrick Gage Kelley
Paulo Casanova
Peng Ning
Petros Efstathopoulos
Pfeffer, Juergen
Platzer, Andre
Poorvi L. Vora
Potanin, Alex
Pradeep K. Murukannaiah
Pradhan, Priysha
Prakash, B. Aditya
Qiben Yan
R. Mayer
R. W. Proctor
Rada Y. Chirkova
Radu Vanciu
Raffaela Mirandola
Rahman, Akond
Rahman, Mohammad Ashiqur
Rahul Telang
Ram Krishnan
Raman Goyal
Randy Bryant
Rao, Ashwini
Reyhaneh Jabbarvand
Riaz, Maria
Richard Shay
Richard T. Carback
Rick Schlichting
Rivers, Anthony T.
Riyadh Mahmood
Robert Harper
Robert Seacord
Robert W. Proctor
Rocky Slavin
Rogerio de Lemos
Rohit Gheyi
Rohit Gheyl
Ron Desmarais
Ronald L. Rivest
Roopak Venkatakrishnan
Rothermel, Gregg
Rui Abreu
Rui Shu
Ryan Wagner
S. Streck
Sagar Chaki
Sam Malek
Sam Weber
Santhosh Prabhu, University of Illinois at Urbana-Champaign
Sarah Nadi
Sarah Pearman
Saranga Komanduri
Schaffer, Henry E.
Schahram Dustdar
Scherlis, Bill
Serge Egelman
Serge Mankovskii
Shahriyar Amini
Shakthi Bachala
Sharad Seth
Shay, Richard
Shayak Sen
Shen, Hui
Shurui Zhou
Simin Chen
Simon D. Parsons
Slavin, Rocky
Somesh Jha
Sonchack, John
Srisa-an, Witawas
Stefan Popoveniuc
Stephanie Balzer
Stephen Broomell
Steve Awodey
Subramani, Shweta
Sudarshan Wadkar
Sumukhi Chandrashekar
Sunshine, Joshua
Supat Rattanasuksun
Sven Apel
Teland, Rahul
Telang, Rahul
Tembe, R.
Tembe, Rucha
Theisen, Christopher
Thomas Christopher King
Thomas Glazier
Thomas J. Glazier
Thomas MacGahan
Thomas Norton
Thomas Thum
Thomas Vogel
Thorsten Berger
Tianyuan Ding
Tien Nguyen
Timothy Passaro
Timothy Vidas
Tina Balke-Visser
Tingting Yu
Travis Breaux
Travis Mayberry
Troy Shaw
Tudor Dumitras
Ur, Blase
Vaclav Rajlich
Vangaveeti, Anoosha
Venkatakrishnan, Roopak
Victor Heorhiadi
Vidas, Timothy
Vincenzo Grassi
Vishal Dwivedi
Vouk, Mladen A.
Vouk. Mladen A
Vyas Sekar
W. Boettcher
Waqar Ahmad
Weining Yang
Welk, A.
West, Andrew
West, Andrew G
Whitney Nelson
Wilhelm Schafer
William Enck
William Scherlis
Williams, Laurie
Witawas Srisa-an
Xe, G.
Xianqing Yu
Xiaohui Gu
Xiaoyin Wang
Yangqingwei Shi
Yaodong Yang
Yibin Wang
Yu Pan
Yu Wang, University of Illinois at Urbana-Champaign
Yu Xianqing
Yu, Tingting
Yuriy Brun
Yutaka Tsutano
Zack Coker
Zawadzki, Erik
Zhenxiang Chen
Zhiqiang Li
Zielinska, O.
Zielinska, Olga A.
Conference Paper
Magazine Article
Journal Article
Conference Proceedings
Book Chapter
Report
Thesis
Presentation
Miscellaneous
Unpublished
Keywords - : concurrency
Keywords - #ifdef
Keywords - #SAT
Keywords - 2019: January
Keywords - A Language and Framework for Development of Secure Mobile Applications
Keywords - Abstracts
Keywords - Access Control
Keywords - access policies
Keywords - active cyber defense
Keywords - Adaptive Autonomy
Keywords - adaptive security
Keywords - Adaptive software
Keywords - Algorithms
Keywords - aliasing
Keywords - analysis
Keywords - and empirical study
Keywords - and Grounded Theory
Keywords - android
Keywords - Android application
Keywords - Android applications
Keywords - Android Malware Detection
Keywords - Android permissions
Keywords - Android platform
Keywords - Anomaly Detection
Keywords - anti-virus
Keywords - app
Keywords - app store
Keywords - Apr'15
Keywords - Apr'16
Keywords - Apr'17
Keywords - architectural extraction
Keywords - attack surface
Keywords - Attack Surface and Defense-in-Depth Metrics
Keywords - auditing
Keywords - August'17
Keywords - authority
Keywords - Automated Synthesis of Resilient Architectures
Keywords - Automated Testing
Keywords - Autonomic computing
Keywords - bidirectional type systems
Keywords - bidirectional typechecking
Keywords - bug
Keywords - build automation tools
Keywords - build automation tools; survey; practitioners
Keywords - Build system; Autotools; Autoconf; Build analysis
Keywords - C Preprocessor
Keywords - C preprocessor · cppstats · variability · configurable systems · open-source systems · industrial systems · software product lines
Keywords - callgraph
Keywords - capabilities
Keywords - capability safety
Keywords - category
Keywords - certification
Keywords - classes
Keywords - classification
Keywords - classroom courses
Keywords - CMU
Keywords - code metrics
Keywords - collaboration
Keywords - Collaborative Intrusion Detection Systems
Keywords - Commitments
Keywords - comparative evaluation
Keywords - Compliance
Keywords - Component Compositions
Keywords - Component-Based Software
Keywords - composability
Keywords - Computational modeling
Keywords - computer aided instruction
Keywords - Computer bugs
Keywords - computer science education
Keywords - Computer simulation
Keywords - Concurrency
Keywords - concurrency faults
Keywords - Configurable Software
Keywords - Configurable Systems
Keywords - configuration as code
Keywords - configuration complexity
Keywords - configuration constraints
Keywords - configuration options
Keywords - configuration scripts
Keywords - constraints
Keywords - Context
Keywords - corpus analysis; object-oriented metrics; points-to analysis; heap abstractions
Keywords - correctness
Keywords - counting
Keywords - CPP
Keywords - crashes
Keywords - crowdsourcing
Keywords - cyber security
Keywords - Cyber-physical systems; analysis contracts; sensor; control
Keywords - Cybersecurity data sharing; risk perception; data usage; personal privacy
Keywords - data analysis
Keywords - data flow analysis
Keywords - Data mining
Keywords - Data Races
Keywords - decision-making
Keywords - defect
Keywords - demographic information
Keywords - Denial-of-Service
Keywords - dependencies
Keywords - Dependency management
Keywords - design
Keywords - Design patterns
Keywords - DevOps
Keywords - Diagnosis
Keywords - Digital audio broadcasting
Keywords - digital communication
Keywords - Digital Forensics
Keywords - Docker Images
Keywords - domainsensitivity
Keywords - Ecosystem
Keywords - education
Keywords - educational courses
Keywords - Empirical Development of Patterns
Keywords - empirical evaluation
Keywords - Empirical Models for Vulnerability Exploits
Keywords - Empirical studies of programmers
Keywords - empirical study
Keywords - Evolving Software
Keywords - experiment design
Keywords - Exploratory Testing
Keywords - extensibility
Keywords - extensible languages
Keywords - extensible syntax; macros; hygiene; type inference
Keywords - false data injection attack
Keywords - feature interaction
Keywords - fine-grained policies
Keywords - firewall
Keywords - first-class classes
Keywords - foreign function interfaces
Keywords - Forensic logging
Keywords - formal models
Keywords - Formal Specification and Analysis of Security-Critical Norms and Policies
Keywords - formal verification
Keywords - foundations
Keywords - Fuzzy logic
Keywords - game theory
Keywords - gradual typing
Keywords - graph typology
Keywords - hedging
Keywords - hierarchical object graphs
Keywords - Highly Configurable Systems
Keywords - HIPAA
Keywords - home automation
Keywords - homotopy theory
Keywords - HTTP Network Traffic
Keywords - Human behavior
Keywords - Human Factors
Keywords - human-in-the-loop
Keywords - hygiene
Keywords - hypernym
Keywords - Hyponym
Keywords - IDS
Keywords - Immutability
Keywords - information diffusion
Keywords - information sharing
Keywords - infrastructure as code
Keywords - initial algebras.
Keywords - Input Generation
Keywords - input sanitation
Keywords - Inter-App vulnerabilities
Keywords - interference control
Keywords - Internet of Things
Keywords - Internet security
Keywords - Interviews
Keywords - Intrusion Detection
Keywords - Jan'15
Keywords - Jan'16
Keywords - Jan'17
Keywords - Java sandbox
Keywords - July'14
Keywords - July'15
Keywords - July'16
Keywords - July'17
Keywords - Kernel
Keywords - kernel debugging
Keywords - Kernels
Keywords - knowledge transfer
Keywords - language-based security
Keywords - Law
Keywords - Linux kernel
Keywords - Literature Review
Keywords - Malware Clas- sification
Keywords - Malware propagation
Keywords - massively open online courses
Keywords - Measurement
Keywords - mechanized metatheory
Keywords - Mental model
Keywords - metaprogramming
Keywords - Metrics
Keywords - microsoft windows
Keywords - Microwave integrated circuits
Keywords - mirrors
Keywords - Mobile app
Keywords - Mobile Security
Keywords - model checking
Keywords - model-based graph clustering
Keywords - modules
Keywords - MOOC format
Keywords - MOOCs
Keywords - moving target defense
Keywords - Mozilla Firefox
Keywords - multiagent systems
Keywords - multithreading
Keywords - Mutability
Keywords - natural language parsing
Keywords - natural language processing
Keywords - NCSU
Keywords - network analysis
Keywords - Network Troubleshooting
Keywords - network virtualization
Keywords - nominal and structural types
Keywords - Norms
Keywords - object graphs; ownership type inference; graph query
Keywords - object-oriented
Keywords - Object-oriented programming; frameworks; interoperability; service abstractions
Keywords - objectives
Keywords - objects
Keywords - Oct'14
Keywords - Oct'15
Keywords - Oct'16
Keywords - October'17
Keywords - on-campus course
Keywords - on-campus software security course
Keywords - online learning
Keywords - Ontology
Keywords - optimization
Keywords - ownership types
Keywords - Parallel garbage collection; Work stealing
Keywords - parallel processing
Keywords - parsing
Keywords - Partial Models
Keywords - pattern matching
Keywords - Patterns
Keywords - patterns security security requirements
Keywords - phishing attacks
Keywords - policy evaluation
Keywords - Policy-Governed Secure Collaboration
Keywords - Power Grid
Keywords - practitioners
Keywords - Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
Keywords - prediction
Keywords - prediction models
Keywords - preprocessors
Keywords - privacy
Keywords - Privacy as expectations
Keywords - Privacy Incidents Database
Keywords - Privacy Policies
Keywords - Privacy Policy
Keywords - privacy principles
Keywords - Privacy summary
Keywords - proactive security reviews
Keywords - Probabilistic Model Checking
Keywords - processes
Keywords - program analysis
Keywords - program editors; type systems; live programming; program prediction
Keywords - Programmer productivity
Keywords - Programming language design
Keywords - Programming language usability
Keywords - protocol
Keywords - psychology
Keywords - puppet
Keywords - qualitative analysis
Keywords - Qualitative research
Keywords - qualitative studies
Keywords - quantifier alternation
Keywords - quiz scores
Keywords - race conditions
Keywords - Race Vulnerability Study and Hybrid Race Detection
Keywords - random sampling
Keywords - RASA
Keywords - Real-time Privacy Risk Evaluation and Enforcement
Keywords - reasoning about conflicts
Keywords - recommender system
Keywords - Refactoring
Keywords - reflection
Keywords - regression testing
Keywords - Regular expressions
Keywords - Relational Logic
Keywords - relationship
Keywords - Reliability
Keywords - rely-guarantee
Keywords - Requirements
Keywords - requirements analysis
Keywords - requirements engineering
Keywords - requirements engineering; patterns; patternmining; abstraction
Keywords - requirements validation
Keywords - requirements; security; privacy; usability; literature survey
Keywords - Resilience Requirements, Design, and Testing
Keywords - Resiliency
Keywords - Resilient Architectures
Keywords - reverse-engineering
Keywords - Risk
Keywords - risk management
Keywords - risk perception.
Keywords - risk-based attack surface approximation
Keywords - run-time
Keywords - Runtime
Keywords - runtime verification
Keywords - sampling
Keywords - sampling error
Keywords - sanctions
Keywords - sandboxing
Keywords - satisfiability
Keywords - Scalability and Composability
Keywords - scale-out
Keywords - scenarios
Keywords - Science of Secure Frameworks
Keywords - Science of Security
Keywords - SDN
Keywords - Secure Composition of Systems and Policies
Keywords - security
Keywords - security and privacy risk
Keywords - security assessment
Keywords - Security behavior; measurement; user studies
Keywords - Security decision-making patterns requirements analysis situation awareness
Keywords - Security feature diagram patterns requirements
Keywords - Security Metrics
Keywords - security of data
Keywords - security requirements
Keywords - security requirements patterns
Keywords - security vulnerabilities
Keywords - Security VulnerabilityMining Software RepositoriesSoftware Analysis
Keywords - Security; Human Factors; Psychology; Analogical Transfer
Keywords - security; non-interference; authorized declassi- fication; epistemic logic
Keywords - security; requirements; patterns; analysis; decision-making; ysituation awareness
Keywords - security; usable security; risk homeostasis theory; risk compensation
Keywords - self-* properties
Keywords - Self-Adaptation
Keywords - self-adaptive systems
Keywords - Self-adaptive systems; Diagnostics; Monitoring
Keywords - Self-protection
Keywords - Self-Protection; Software Architecture; Software Security
Keywords - semantic versioning
Keywords - sequence diagram
Keywords - Session types; Linear logic; Process calculi; Strong normalization; Confluence; Logical relations; Observational equivalences
Keywords - Situation Awareness
Keywords - Smart Isolation in Large-Scale Production Computing Infrastructures
Keywords - social engineering
Keywords - social network analysis
Keywords - social norms
Keywords - socio-technical factors
Keywords - Sociology
Keywords - sociotechnical systems
Keywords - Software
Keywords - Software Architecture
Keywords - software architecture; architectural control; distributed systems; capabilities; layered architectures; alias control; domain specific languages
Keywords - Software dependability
Keywords - software development lifecycle
Keywords - Software ecosystems
Keywords - software ecosystems; notification feeds; information overload; transparent environments; anomaly detection
Keywords - software engineering
Keywords - Software patterns
Keywords - software protection
Keywords - software quality
Keywords - software security coursework
Keywords - software security material
Keywords - Software Security Metrics
Keywords - Software systems
Keywords - Software Testing
Keywords - software-defined networking
Keywords - SoS Lablet Research Methods, Community Development and Support
Keywords - Stack traces
Keywords - state
Keywords - state estimation
Keywords - State Space Exploration
Keywords - State Space Reduction
Keywords - State Space Size Estimation
Keywords - static analyses
Keywords - static analysis
Keywords - static type checking
Keywords - string sanitation
Keywords - structure editors
Keywords - student motivations
Keywords - supply chain security
Keywords - survey
Keywords - Surveys
Keywords - Syntactics
Keywords - tags
Keywords - taxonomy
Keywords - Taxonomy and Survey
Keywords - teaching
Keywords - templates
Keywords - Temporal Logic
Keywords - temporal reasoning
Keywords - test efforts
Keywords - testing
Keywords - Text Mining
Keywords - threat indicators
Keywords - Time/Fidelity trade-offs
Keywords - Trade-Offs
Keywords - type declarations
Keywords - type inference
Keywords - type systems
Keywords - Type theory
Keywords - type-2
Keywords - typestates
Keywords - UMD
Keywords - uncertainty
Keywords - Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Keywords - update criteria
Keywords - usability; key fingerprints; authentication; secure messaging
Keywords - USE: User Security Behavior
Keywords - user study
Keywords - user study; vignettes; scenarios; security requirements; requirements elicitation
Keywords - Utility-privacy tradeoff
Keywords - vagueness
Keywords - Variability models
Keywords - Variability-Aware Execution
Keywords - Variational data structures
Keywords - verification
Keywords - vignettes
Keywords - Violation Detection
Keywords - virtual platforms
Keywords - visualization
Keywords - vulnerabilities
Keywords - Vulnerability and Resilience Prediction Models
Keywords - Vulnerability Propagation
Keywords - Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Keywords - Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
Keywords - web security
Keywords - Wyvern
NCSU SoS Lablet: Projects - Smart Isolation in Large-Scale Production Computing Infrastructures
NCSU SoS Lablet: Projects - Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
SoS Lablet Universities & Projects - NCSU
SoS LR 3.0: Hard Problem - Policy-Governed Secure Collaboration
SoS LR 3.0: Lablet - NCSU
SoS LR 3.0: Project - Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
SoS LR 3.0: Project - Reasoning about Accidental and Malicious Misuse via Formal Methods
SoS LR 3.0: Quarter - 2019: January
SoS LR 3.0: Quarter - 2021: October
SoS LR: Hard Problem - Human Behavior
SoS LR: Hard Problem - Metrics
SoS LR: Hard Problem - Policy-Governed Secure Collaboration
SoS LR: Hard Problem - Resilient Architectures
SoS LR: Hard Problem - Scalability and Composability
SoS LR: Lablet - CMU
SoS LR: Lablet - NCSU
SoS LR: Lablet - UMD
SoS LR: Project - A Language and Framework for Development of Secure Mobile Applications
SoS LR: Project - Attack Surface and Defense-in-Depth Metrics
SoS LR: Project - Automated Synthesis of Resilient Architectures
SoS LR: Project - CMU PROJECTS: (select all that apply)
SoS LR: Project - Empirical Models for Vulnerability Exploits
SoS LR: Project - Formal Specification and Analysis of Security-Critical Norms and Policies
SoS LR: Project - Highly Configurable Systems
SoS LR: Project - Privacy Incidents Database
SoS LR: Project - Race Vulnerability Study and Hybrid Race Detection
SoS LR: Project - Real-time Privacy Risk Evaluation and Enforcement
SoS LR: Project - Resilience Requirements, Design, and Testing
SoS LR: Project - Science of Secure Frameworks
SoS LR: Project - Secure Composition of Systems and Policies
SoS LR: Project - Smart Isolation in Large-Scale Production Computing Infrastructures
SoS LR: Project - SoS Lablet Research Methods, Community Development and Support
SoS LR: Project - UMD PROJECTS:
SoS LR: Project - Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
SoS LR: Project - USE: User Security Behavior
SoS LR: Project - Vulnerability and Resilience Prediction Models
SoS LR: Project - Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
SoS LR: Quarter - Apr'15
SoS LR: Quarter - Apr'16
SoS LR: Quarter - Apr'17
SoS LR: Quarter - August'17
SoS LR: Quarter - Jan'15
SoS LR: Quarter - Jan'16
SoS LR: Quarter - Jan'17
SoS LR: Quarter - July'14
SoS LR: Quarter - July'15
SoS LR: Quarter - July'16
SoS LR: Quarter - Oct'14
SoS LR: Quarter - Oct'15
SoS LR: Quarter - Oct'16
SoS LR: Quarter - October'17
UMD SoS Lablet: Projects - Empirical Models for Vulnerability Exploits
Submitted
In Press
2022
2020
2019
2017
2016
2015
2014
2013
2012
2011
: concurrency
#ifdef
#SAT
2019: January
2021: October
A Language and Framework for Development of Secure Mobile Applications
Abstracts
Access Control
access policies
active cyber defense
Adaptive Autonomy
adaptive security
Adaptive software
Algorithms
aliasing
Analysis
and empirical study
and Grounded Theory
android
Android application
Android applications
Android Malware Detection
Android permissions
Android platform
anomaly detection
anti-virus
app
app store
Apr'15
Apr'16
Apr'17
architectural extraction
attack surface
Attack Surface and Defense-in-Depth Metrics
auditing
August'17
authority
Automated Synthesis of Resilient Architectures
Automated Testing
Autonomic computing
bidirectional type systems
bidirectional typechecking
bug
build automation tools
build automation tools; survey; practitioners
Build system; Autotools; Autoconf; Build analysis
C Preprocessor
C preprocessor · cppstats · variability · configurable systems · open-source systems · industrial systems · software product lines
callgraph
capabilities
capability safety
category
certification
classes
classification
classroom courses
CMU
code metrics
Collaboration
Collaborative Intrusion Detection Systems
Commitments
comparative evaluation
compliance
Component Compositions
Component-Based Software
composability
Computational modeling
computer aided instruction
Computer bugs
computer science education
Computer simulation
Concurrency
concurrency faults
Configurable Software
Configurable Systems
configuration as code
configuration complexity
configuration constraints
configuration options
configuration scripts
constraints
Context
corpus analysis; object-oriented metrics; points-to analysis; heap abstractions
correctness
counting
CPP
crashes
crowdsourcing
cyber security
Cyber-physical systems; analysis contracts; sensor; control
Cybersecurity data sharing; risk perception; data usage; personal privacy
Data analysis
data flow analysis
data mining
Data Races
decision-making
defect
demographic information
denial-of-service
dependencies
Dependency management
Design
Design patterns
DevOps
Diagnosis
Digital audio broadcasting
digital communication
digital forensics
Docker Images
domainsensitivity
Ecosystem
Education
educational courses
Empirical Development of Patterns
empirical evaluation
Empirical Models for Vulnerability Exploits
Empirical studies of programmers
empirical study
Evolving Software
experiment design
Exploratory Testing
extensibility
extensible languages
extensible syntax; macros; hygiene; type inference
false data injection attack
Feature Interaction
fine-grained policies
firewall
first-class classes
foreign function interfaces
Forensic logging
formal models
Formal Specification and Analysis of Security-Critical Norms and Policies
formal verification
Foundations
Fuzzy logic
game theory
gradual typing
graph typology
hedging
hierarchical object graphs
Highly Configurable Systems
HIPAA
home automation
homotopy theory
HTTP Network Traffic
Human Behavior
human factors
Human-in-the-Loop
hygiene
hypernym
Hyponym
IDS
Immutability
information diffusion
information sharing
infrastructure as code
initial algebras.
Input Generation
input sanitation
Inter-App vulnerabilities
interference control
Internet of Things
Internet security
Interviews
Intrusion detection
Jan'15
Jan'16
Jan'17
Java sandbox
July'14
July'15
July'16
July'17
Kernel
kernel debugging
Kernels
knowledge transfer
language-based security
Law
Linux kernel
literature review
Malware Clas- sification
Malware propagation
massively open online courses
Measurement
mechanized metatheory
Mental model
metaprogramming
Metrics
Microsoft Windows
Microwave integrated circuits
mirrors
Mobile app
mobile security
model checking
model-based graph clustering
modules
MOOC format
MOOCs
moving target defense
Mozilla Firefox
multiagent systems
multithreading
Mutability
natural language parsing
natural language processing
NCSU
network analysis
Network Troubleshooting
network virtualization
nominal and structural types
Norms
object graphs; ownership type inference; graph query
object-oriented
Object-oriented programming; frameworks; interoperability; service abstractions
objectives
objects
Oct'14
Oct'15
Oct'16
October'17
on-campus course
on-campus software security course
online learning
Ontology
Optimization
ownership types
Parallel garbage collection; Work stealing
parallel processing
parsing
Partial Models
Pattern matching
patterns
patterns security security requirements
phishing attacks
policy evaluation
Policy-Governed Secure Collaboration
power grid
practitioners
Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
prediction
prediction models
preprocessors
privacy
Privacy as expectations
Privacy Incidents Database
Privacy Policies
privacy policy
privacy principles
Privacy summary
proactive security reviews
probabilistic model checking
Processes
program analysis
program editors; type systems; live programming; program prediction
Programmer productivity
Programming language design
Programming language usability
protocol
psychology
puppet
qualitative analysis
Qualitative research
qualitative studies
quantifier alternation
quiz scores
race conditions
Race Vulnerability Study and Hybrid Race Detection
random sampling
RASA
Real-time Privacy Risk Evaluation and Enforcement
Reasoning about Accidental and Malicious Misuse via Formal Methods
reasoning about conflicts
recommender system
Refactoring
reflection
regression testing
regular expressions
Relational Logic
relationship
reliability
rely-guarantee
requirements
requirements analysis
requirements engineering
requirements engineering; patterns; patternmining; abstraction
requirements validation
requirements; security; privacy; usability; literature survey
Resilience Requirements, Design, and Testing
Resiliency
Resilient Architectures
reverse-engineering
risk
risk management
risk perception.
risk-based attack surface approximation
run-time
Runtime
runtime verification
sampling
sampling error
sanctions
Sandboxing
satisfiability
Scalability and Composability
scale-out
scenarios
Science of Secure Frameworks
science of security
SDN
Secure Composition of Systems and Policies
security
security and privacy risk
security assessment
Security behavior; measurement; user studies
Security decision-making patterns requirements analysis situation awareness
Security feature diagram patterns requirements
security metrics
security of data
security requirements
security requirements patterns
security vulnerabilities
Security VulnerabilityMining Software RepositoriesSoftware Analysis
Security; Human Factors; Psychology; Analogical Transfer
security; non-interference; authorized declassi- fication; epistemic logic
security; requirements; patterns; analysis; decision-making; ysituation awareness
security; usable security; risk homeostasis theory; risk compensation
self-* properties
self-adaptation
self-adaptive systems
Self-adaptive systems; Diagnostics; Monitoring
Self-protection
Self-Protection; Software Architecture; Software Security
semantic versioning
sequence diagram
Session types; Linear logic; Process calculi; Strong normalization; Confluence; Logical relations; Observational equivalences
situation awareness
Smart Isolation in Large-Scale Production Computing Infrastructures
Social Engineering
social network analysis
social norms
socio-technical factors
Sociology
sociotechnical systems
Software
software architecture
software architecture; architectural control; distributed systems; capabilities; layered architectures; alias control; domain specific languages
Software dependability
software development lifecycle
Software ecosystems
software ecosystems; notification feeds; information overload; transparent environments; anomaly detection
software engineering
Software patterns
software protection
software quality
software security coursework
software security material
Software Security Metrics
Software systems
Software Testing
software-defined networking
SoS Lablet Research Methods, Community Development and Support
Stack traces
state
state estimation
State Space Exploration
State Space Reduction
State Space Size Estimation
static analyses
static analysis
static type checking
string sanitation
structure editors
student motivations
supply chain security
survey
Surveys
Syntactics
tags
Taxonomy
Taxonomy and Survey
teaching
templates
temporal logic
temporal reasoning
test efforts
Testing
text mining
threat indicators
Time/Fidelity trade-offs
Trade-Offs
type declarations
type inference
type systems
Type theory
type-2
typestates
UMD
Uncertainty
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
update criteria
usability; key fingerprints; authentication; secure messaging
USE: User Security Behavior
user study
user study; vignettes; scenarios; security requirements; requirements elicitation
Utility-privacy tradeoff
vagueness
Variability models
Variability-Aware Execution
Variational data structures
verification
vignettes
Violation Detection
virtual platforms
visualization
vulnerabilities
Vulnerability and Resilience Prediction Models
Vulnerability Propagation
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
web security
Wyvern