Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
NCSU Science of Security Lablet Research Initiative
Home
Projects
Past Projects
Researchers
Activity Stream
Members
Publications
Files
CPS-VO
»
Science of Security VO
»
NCSU Science of Security Lablet Research Initiative
» BIBLIO
Biblio
List
Filter
Show only items where
Author
Type
Term
Year
Keyword
is
Anon
A. Xiong
Abdullah Al Faroq
Adwait Nadkarni
Aiping Xiong
Akond Rahman
Al-Shaer, Ehab
Al-Zyoud, Mahran
Allaire K. Welk
Allaire Welk
Alok Goel
Alsaleh, Mohammed
Amarjit Datta
Andrew Meneely
Anoosha Vangaveeti
Arpan Chakraborty
B. Murphy
Bart Knijnenburg
Benjamin Andow
Benjamin Short
Bennett Y. Narron
Boettcher, William A.
Brent Harrison
Burcham, Morgan
C. S. Gates
C. Theisen
Carver, Jeffrey C.
Chen, Jing
Chris Parnin
Christopher B. Mayhorn
Dai, Huaiyu
David L. Roberts
David Roberts
Dhawan, Jayant
Domínguez, Ignacio X.
Donghoon Kim
Du, Hongying
E. Murphy-Hill
Effat Farhana
Ehab Al-Shaer
Ehab Al-Shaer
Emerson Murphy-Hill
Emily Berglund
George F. List
Gilani, Fida
Haining Chen
Hani Jamjoom
He, Xiaofan
Heather Lipford
Henry E. Schaffer
Hong, K. W.
Hongying Du
Huaiyu Dai
Ian Molloy
Ignacio Dominguez
Ignacio X. Dominguez
J. Chen
J. Knight
J. Xiang
Jasmine Jones
Jason Gionta
Jayant Dhawan
Jessica Staddon
Jiaming Jiang
Jiang, Jun
Jin, Richeng
Jing Chen
Jon Doyle
Jordan Tice
Jose M. Such
Justin Pelletier, Nuthan Munaiah, Shau-Hsuan Su, S. Jay Yang, Andrew Meneely
K. Herzig
K. Oliver
Kafalı, Özgür
Kevin Sullivan
Kim, Donghoon
L. Williams
Laurie Williams
Li, Ninghui
Luke Deshotels
Mayer, Roger C.
Mayhorn, C. B.
Mayhorn, Christopher B.
Meder, David
Megan Petruso
Mehdi Mashayekhi
Michael K. Reiter
Mladen A. Vouk
Mladen Vouk
Mohammad Ashiqur Rahman
Mohammad M. Islam
Munaiah, Nuthan
Munindar P. Singh
Murphy-Hill, E.
Murphy-Hill, Emerson
N. Li
Ninghui Li
Nirav Ajmeri
Nuthan Munaiah
Olga A. Zielinska
Olga Zielinska
Omar Chowdhury
Ozgur Kafali
Partho, Asif
Pearson, C.
Pearson, C. J.
Pearson, Carl J.
Peipei Wang
Peng Ning
Pradeep K. Murukannaiah
Pradeep Murukannaiah
Pradhan, Priysha
Prairie Rose Goodwin
Proctor, Robert W
Proctor, Robert W.
Pu Yang
R. W. Proctor
Rada Y. Chirkova
Rahman, Akond
Ricard López Fogués
Richeng Jin
Robert Proctor
Robert St. Amant
Robert St. Amant
Robert W. Proctor
Roberts, David L.
Roopak Venkatakrishnan
Rudra Dutta
Rui Shu
Ryan Wilson
Schaffer, Henry E.
Sheng Liu
Shriram Rajagopalan
Sigmund A. Gorski III
Simons-Rudolph, Joseph M.
Somesh Jha
St. Amant, Robert
Streck, Sean
Suresh Chari
T. Yu
Tembe, R.
Theisen, Christopher
Victor Heorhiadi
Vouk, Mladen A.
Vyas Sekar
W. Yang
Wanling Zou
Warut Khern-Am-Nuai
Weining Yang
Welk, A.
Welk, A. K.
Welk, Allaire
Welk, Allaire K.
William Enck
Williams, Laurie
Xe, G.
Xiaofan He
Xiaohui Gu
Xioafan He
Xiong, Aiping
Yang, Weining
Yasir Khan
Youngja Park
Yufan Huang
Z. Jorgensen
Zielinska, O.
Zielinska, O.A.
Zielinska, Olga
Journal Article
Conference Paper
Conference Proceedings
Journal
Unpublished
Magazine Article
Report
Thesis
Keywords - 2019: January
Keywords - A Human Information-Processing Analysis of Online Deception Detection
Keywords - Android application
Keywords - app selection
Keywords - attack surface
Keywords - Attack Surface and Defense-in-Depth Metrics
Keywords - attack surface metrics
Keywords - Automated Synthesis of Resilient Architectures
Keywords - automation
Keywords - bug
Keywords - build automation tools
Keywords - category
Keywords - classroom courses
Keywords - code metrics
Keywords - Collaborative Intrusion Detection Systems
Keywords - Commitments
Keywords - computer aided instruction
Keywords - Computer bugs
Keywords - computer science education
Keywords - configuration as code
Keywords - configuration scripts
Keywords - CPS Technologies
Keywords - crash dumps
Keywords - crashes
Keywords - Cybersecurity
Keywords - Decision Making
Keywords - decision-making
Keywords - defect
Keywords - demographic information
Keywords - DevOps
Keywords - Digital audio broadcasting
Keywords - education
Keywords - educational courses
Keywords - Email
Keywords - Formal Specification and Analysis of Security-Critical Norms and Policies
Keywords - foundations
Keywords - game theory
Keywords - Human behavior
Keywords - Human Factors
Keywords - human factors; phishing attacks; psychology; Social Engineering
Keywords - human information processing
Keywords - IDS Configuration
Keywords - information processing
Keywords - information security
Keywords - infrastructure as code
Keywords - isolation
Keywords - Jan'17
Keywords - July'16
Keywords - July'17
Keywords - Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Keywords - Literature Review
Keywords - massively open online courses
Keywords - Measurement
Keywords - Metrics
Keywords - microsoft windows
Keywords - MOOC format
Keywords - MOOCs
Keywords - Mozilla Firefox
Keywords - NCSU
Keywords - Norms
Keywords - Oct'16
Keywords - on-campus course
Keywords - on-campus software security course
Keywords - online learning
Keywords - persuasion
Keywords - Phishing
Keywords - phishing; field study; active warning
Keywords - Policy-Governed Secure Collaboration
Keywords - practitioners
Keywords - Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
Keywords - prediction
Keywords - prediction models
Keywords - privacy
Keywords - Privacy Incidents Database
Keywords - proactive security reviews
Keywords - puppet
Keywords - quiz scores
Keywords - random sampling
Keywords - RASA
Keywords - reasoning about conflicts
Keywords - Redundancy for Network Intrusion Prevention Systems (NIPS)
Keywords - reliance
Keywords - Resilience Requirements, Design, and Testing
Keywords - Resilient Architectures
Keywords - Resilient Systems
Keywords - Risk
Keywords - risk communication
Keywords - risk management
Keywords - risk perception
Keywords - risk-based attack surface approximation
Keywords - Round 2 Projects
Keywords - Scalability and Composability
Keywords - Science of Security
Keywords - Scientific Understanding of Policy Complexity
Keywords - security
Keywords - security and privacy risk
Keywords - Security Metrics
Keywords - security of data
Keywords - Smart Isolation in Large-Scale Production Computing Infrastructures
Keywords - social engineering
Keywords - Software
Keywords - software development lifecycle
Keywords - software engineering
Keywords - software quality
Keywords - software security coursework
Keywords - software security material
Keywords - Software systems
Keywords - SoS Lablet Research Methods, Community Development and Support
Keywords - Stack traces
Keywords - Strain
Keywords - student motivations
Keywords - Support, and Other Projects
Keywords - survey
Keywords - Systematization of Knowledge from Intrusion Detection Models
Keywords - taxonomy
Keywords - teaching
Keywords - test efforts
Keywords - testing
Keywords - trust
Keywords - Understanding Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Keywords - Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Keywords - Utility-privacy tradeoff
Keywords - validation and verification
Keywords - Vulnerability and Resilience Prediction Models
Keywords - Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Keywords - Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
Keywords - warnings
Keywords - workload
NCSU SoS Lablet: Projects - A Human Information-Processing Analysis of Online Deception Detection
NCSU SoS Lablet: Projects - Attack Surface and Defense-in-Depth Metrics
NCSU SoS Lablet: Projects - Automated Synthesis of Resilient Architectures
NCSU SoS Lablet: Projects - Formal Specification and Analysis of Security-Critical Norms and Policies
NCSU SoS Lablet: Projects - Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
NCSU SoS Lablet: Projects - Privacy Incidents Database
NCSU SoS Lablet: Projects - Redundancy for Network Intrusion Prevention Systems (NIPS)
NCSU SoS Lablet: Projects - Resilience Requirements, Design, and Testing
NCSU SoS Lablet: Projects - Round 2 Projects
NCSU SoS Lablet: Projects - Scientific Understanding of Policy Complexity
NCSU SoS Lablet: Projects - Smart Isolation in Large-Scale Production Computing Infrastructures
NCSU SoS Lablet: Projects - Systematization of Knowledge from Intrusion Detection Models
NCSU SoS Lablet: Projects - Understanding Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
NCSU SoS Lablet: Projects - Vulnerability and Resilience Prediction Models
NCSU SoS Lablet: Projects - Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
SoS Lablet Universities & Projects - NCSU
SoS LR 3.0: Project - Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
SoS LR 3.0: Quarter - 2019: January
SoS LR: Hard Problem - Human Behavior
SoS LR: Hard Problem - Metrics
SoS LR: Hard Problem - Policy-Governed Secure Collaboration
SoS LR: Hard Problem - Resilient Architectures
SoS LR: Lablet - NCSU
SoS LR: Project - Formal Specification and Analysis of Security-Critical Norms and Policies
SoS LR: Project - Smart Isolation in Large-Scale Production Computing Infrastructures
SoS LR: Project - SoS Lablet Research Methods, Community Development and Support
SoS LR: Project - Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
SoS LR: Project - Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
SoS LR: Quarter - August'17
SoS LR: Quarter - July'16
SoS LR: Quarter - Oct'16
Topics - Resilient Systems
Submitted
2020
2019
2017
2016
2015
2014
2019: January
A Human Information-Processing Analysis of Online Deception Detection
Android application
app selection
attack surface
Attack Surface and Defense-in-Depth Metrics
attack surface metrics
Automated Synthesis of Resilient Architectures
Automation
bug
build automation tools
category
classroom courses
code metrics
Collaborative Intrusion Detection Systems
Commitments
computer aided instruction
Computer bugs
computer science education
configuration as code
configuration scripts
CPS Technologies
crash dumps
crashes
cybersecurity
decision making
decision-making
defect
demographic information
DevOps
Digital audio broadcasting
Education
educational courses
Email
Formal Specification and Analysis of Security-Critical Norms and Policies
Foundations
game theory
Human Behavior
human factors
human factors; phishing attacks; psychology; Social Engineering
human information processing
IDS Configuration
information processing
Information security
infrastructure as code
isolation
Jan'17
July'16
July'17
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
literature review
massively open online courses
Measurement
Metrics
Microsoft Windows
MOOC format
MOOCs
Mozilla Firefox
NCSU
Norms
Oct'16
on-campus course
on-campus software security course
online learning
persuasion
phishing
phishing; field study; active warning
Policy-Governed Secure Collaboration
practitioners
Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
prediction
prediction models
privacy
Privacy Incidents Database
proactive security reviews
puppet
quiz scores
random sampling
RASA
reasoning about conflicts
Redundancy for Network Intrusion Prevention Systems (NIPS)
reliance
Resilience Requirements, Design, and Testing
Resilient Architectures
Resilient Systems
risk
risk communication
risk management
risk perception
risk-based attack surface approximation
Round 2 Projects
Scalability and Composability
science of security
Scientific Understanding of Policy Complexity
security
security and privacy risk
security metrics
security of data
Smart Isolation in Large-Scale Production Computing Infrastructures
Social Engineering
Software
software development lifecycle
software engineering
software quality
software security coursework
software security material
Software systems
SoS Lablet Research Methods, Community Development and Support
Stack traces
Strain
student motivations
Support, and Other Projects
survey
Systematization of Knowledge from Intrusion Detection Models
Taxonomy
teaching
test efforts
Testing
Trust
Understanding Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Utility-privacy tradeoff
Validation and Verification
Vulnerability and Resilience Prediction Models
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
warnings
workload