Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
CPS-VO
»
Science of Security VO
»
Science of Security and Privacy: Lablet Program Management
» BIBLIO
Biblio
List
Filter
Show only items where
Author
Type
Term
Year
Keyword
is
Anon
A. {Fawaz}
Abdulmalik Humayed
Abhishek Dubey
Acquisti, Alessandro
Adam Bates
Adam Bates, University of Illinois at Urbana-Champaign
Adam Oest
Adam Petz
Adam Sales
Adam Wynne
Adepu, Sridhar
Adwait Nadkarni
Agarwal, Gaurav
Ahmad Moghimi
Ahmed Fawaz
Ahmed Fawaz, University of Illinois at Urbana-Champaign
Aiping Xiong
Ajay Chhokra
Akhil Acharya
Akın Günay
Akond Rahman
Ákos Lédeczi
Al Faruque, Mohammad Abdullah
Al-Shaer, Ehab
Al-Zyoud, Mahran
Alain Forget
Alan T. Sherman
Aldrich, Jonathan
Aleksander Essex
Alessandra Gorla
Alessandro Acquisti
Alex Davis
Alex Potanin
Alexander, Perry
Alexandre M. Bayen
Alharbi, Mohammed
Ali I. Ozdagli
Ali Jadbabaie
Ali Kheradmand
Ali Kheradmand, University of Illinois at Urbana-Champaign
Ali Ozdagli
Aline Viana
Alireza Sadeghi
Alisa Frik
Allaire K. Welk
Alsaleh, Mohammed
Álvaro Feal
Amanda Hsu
Amin Ghafouri
Amir Modarresi
Amir Modarresia
Amit Elazari
Amit Elazari Bar On
Amit K. Chopra
Amit Vasudevan
Ananth Balashankar
Anastasia Mavridou
Anca D. Dragan
Anca Dragan
Andre Platzer
Andrea Bajcsy
Andreas Tolk
Andrew Giang
Andrew Meneely
Aniket Kate
Aniruddha Gokhale
Anirudh Narasimman
Ankush Singla
Anna Fritz
Anna Sperotto
Anne Edmundson, Princeton University
Anronia Lopes
Antonia Lopes
Anup K. Kalia
Anupam Datta
Apu Kapadia
Arbob Ahmad
Armando Rodriguez
Arnab Kumar
Aron Laszka
Ashwini Rao
Aved, Alex
Aviv, Adam
Aviv, Adam J
B. {Chen}
B. Murphy
Bach, Ruben L.
Baker, Miles
Baldimtsi, Foteini
Baldoino Fonseca
Balzer, Stephanie
Bao, Feng
Barnaby, Celeste
Baruch Fischhoff
Basil Becker
Basu, Soumya
Bates, Adam
Bauer, Lujo
Ben Blum
Bender, Christopher M.
Benjamin Andow
Benjamin Chung
Benjamin E. Ujcich
Benjamin E. Ujcich, University of Illinois at Urbana-Champaign
Benjamin Recht
Benjamin Ujcich
Bernard Yett
Bernardo Toninho
Bertrand, Nathalie
Bhagavatula, Sruti
Bhaskaran Raman
Bin Hu
Binbin Chen
Binbin Chen, Advanced Digital Sciences Center Singapre
Bingyu Li
Bingzhe Liu
Blasch, Erik
Blase Ur
Bloem, Yannick
Bo Chen
Bo Li
Bo Luo
Bo Zhang
Bobba, Rakesh B.
Bohara, Atul
Bojan Cukic
Bortolussi, Luca
Brad Myers
Bradley Myers
Bradley Potteiger
Bradley Reaves
Bradley Schmerl
Breaux, Travis
Brendan Murphy
Brett Feddersen, University of Illinois at Urbana-Champaign
Brian Broll
Brighten Godfrey
Brighten Godfrey, University of Illinois at Urbana-Champaign
Bruno Ferreira
Burcham, Morgan
Bures, Tomas
C. {Cheh}
C. Pearson
C. Theisen
C. Tomlin
Calinescu, Radu
Cámara, Javier
Canedo, Arquimedes
Capell, Peter
Carley, Kathleen
Carley, L. Richard
Carlos A. Barreto
Carlos Barreto
Carmen Cheh
Carmen Cheh, University of Illinois at Urbana-Champaign
Carver, Jeffrey C.
Casey Canfield
Casimiro, Maria
Catherine Han
Charu Sharma
Chatzigiannis, Panagiotis
Chau, Duen Horng
Chee Yee Tang
CheeYee Tang
Cheh, Carmen
Chen Chen, Argonne National Laboratory
Chen, Binbin
Chengliang Tian
Chenglong Wang
Cheol Won Lee, National Research Institute, South Korea
Choucri, Nazli
Chris Parnin
Chris Seasholtz
Christian Bessiere
Christian Kästner
Christian Prehofer
Christian Wagner
Christin, Nicolas
Christopher B. Mayhorn
Christopher Bender
Christopher Bogart
Christopher Hannon
Christopher Hannon, Illinois Institute of Technology
Christopher Theisen
Chu-Pan Wong
Chuchu Fan
Chung-Wei Hang
Chung, Benjamin
Claiborne Johnson
Claire J. Tomlin
Claire Le Goues
Claire Tomlin
Claus Hunsen
Coblenz, Michael
Cody Kinneer
Congli Wang
Craggs, Barnaby
Cranor, Lorrie
Cristina Nita-Rotaru, Northeastern University
Cuong Nguyen
Cyrus Omar
Dai, Huaiyu
Daniel Balasubramanian
Daniel Jackson
Daniel Long
Daniel M. Best
Daniel Marino
Daniel Smullen
Danny Weyns
Darema, Frederica
Darya Kurilova
Darya Melicher (Kurilova)
David Chaum
David Fridovich-Keil
David Garlan
David M. Nicol
David Nicol
David Wagner
Dawei Chu
Dawei Sun
Dawid Gawel
Dawson Tripp
Deepak Garg
Deglurkar, Sampada
Deirdre Mulligan
Deka, Deepjyoti
Deka, Shankar A.
Deng, Robert
Dennis Griffith, University of Illinois at Urbana-Champaign
Dennis Smith
Dhillon, Inderjit
Dimitrios Boursinos
Dio De Niz
Dong Jin
Dong Jin, Illinois Institute of Technology
Donghoo Kim
Dongwon Lee
Du Li
Du, Hongying
Dubovitskaya, Alevtina
Dullerud, Geir E.
Dumitras, Tudor
E. Murphy-Hill
Ebrahim Khalaj
Edward N. Zalta
Effat Farhana
Egelman, Serge
Ehab Al-Shaer
Elazari, Amit
Elena Peterson
Eli Bronstein
Elisa Bertino
Elise McEllhiney
ellin zhao
Ellis Ratner
Elsa Gunter, University of Illinois at Urbana-Champaign
Emerson Murphy-Hill
Emily Shen
Eric Walkingshaw
Eric Yuan
Erik Zawadzki
Esther Wang
Etzel, Tyler
Eunsuk Kang
Eyal Peer
F. {Cai}
Fabrizio Cicala
Fadi Zaraket
Faloutsos, Christos
Fang, Fei
Farshchi, Farzad
Farzad Farshchi
Faust, Aleksandra
Fawaz, Ahmed
Feddersen, Brett
Fei Fang
Feiyang Cai
Fengjun Li
Ferdian Thung
Fichter, Dane
Filip Zagórski
Filipre Militao
Fisman, Dana
Fitzgerald, John
Flavio Medeiros
Florian Schaub
Forget, Alain
Forrest Shull
Frank Pfenning
Franziska Roesner
Fredrikson, Matthew
Fulton, Nathan
Gabor Karsai
Gabriel Ferreira
Gabriel Moreno
Gabriel Tamura
Gadepally, Vijay
Garg, Vaibhav
Garlan, David
Garth Gibson
Gautam Biswas
Ge, Xi
Geir Dullerud
Geir Dullerud, University of Illinois at Urbana-Champaign
Geir E. Dullerud
Geoffrey Gordon
Geoffrey Morgan
George F. List
George Pappas
Gerdon, Frederic
Ghita Mezzour
Ghorbal, Khalil
Gianni Antichi
Gilani, Fida
Gohar Irfan Chaudhry, University of Illinois at Urbana-Champaign
Gong Chen
Gordon, Geoffrey
Gouni, Hemant
Grant Jurgensen
Gregg Rothermel
Gregor Engels
Gu, Xiaohui
Guangqi Liu
Guanhua Yan
Gunter Saake
Guo, Hui
H. Larochelle
H. Lin
Haibing Lu
Hamed Haddadi
Hamed Okhravi
Hamed Okhravi, MIT Lincoln Laboratroy
Hamid Bagheri
Hamid Zare
Han Wang
Hanan Hibshi
Hanlin Zhang
Hannon, Christopher
Hao Xue
Haque, Amanul
Harigovind Ramasamy
Harsh Vardhan
Hassan Jaleel
Hausi Muller
He, Jingzhu
He, Xiaofan
Heather Lipford
Heechul Yun
Heemels, W.P.M.H.
Helble, Sarah C.
Helen Nissenbaum
Hemank Lamba
Herbsleb, James
Hibshi, Hanan
Himanshu Neema
Hoang Hai Nguyen
Holger Giese
Hong Jiang
Hong, K. W.
Hong, Kyung Wha
Hongying Du
Hua Wu
Huang, Shihong
Hui Guo
Hui Shen
Hussein Sibai
Hyunjing Seo
Hyunwoo Sohn
Ian Voysey
Imtiaz, Nasif
Irwin Reyes
Isabelle Puaut
Ivan Ruchkin
J. Aaron Pendergrass
J. Simons-Rodolph
Jack Horner
Jackson Dinh
Jacob Fustos
Jafar Al-Kofahi
Jaime Fisac
Jaime S. Sichman
James Herbsleb
James Hester
James Landry, MIT Lincoln Laboratory
Janet Siegmund
Janne Lindqvist
Janos Sztipanovits
Jantz, Michael R.
Jason Hickey
Jason Hong
Jason King
Jason Liu, Florida International University
Jaspreet Bhatia
Javier Camara
Jean-Michel Lehker
Jeannin, Jean-Baptiste
Jeff Gennari
Jeff Kramer
Jeff Magee
Jeffery von Ronne
Jeffrey Barnes
Jeffrey C. Carver
Jeffrey Gennari
Jens Meinicke
Jeon, Sung Woo
Jeremy Clark
Jeremy Thomas
Jesper Andersson
Jessica Staddon
Jia Yu
Jialiu Lin
Jiameng Shi
Jiaming Jiang
Jiang, Jun
Jiang, Minghao
Jianhui Wang, Argonne National Laboratory
Jiani Li
Jianwei Niu
Jiaqi Yan
Jiaqi Yan, Illinois Institute of Technology
Jin, Dong
Jin, Richeng
Jin, Zhi
Jing Chen
Jingqiang Lin
Jingzhu He
Jiri Simsa
Jiwu Jing
Joao Jansch Porto
Joao Pedro Sousa
Jochen Wuttke
Joel Lee
Joel Reardon
Joel Reidenberg
John Myopoulos
John Ramsdell
John Slankas
John Symons
John Wittrock
Jon Doyle
Jonathan Aldrich
Jonathan Shahen
Jorge Perez
Joseph Bonneau
Joseph Camp
Joseph Lee
Joshua Garcia
Joshua Kroll
Joshua Sunshine
Joshua Tan
Joy Zhang
Joyce Lee
Ju-Sung Lee
Julia Bernd
Jun Huan
Jun Ma
Junier Oliva
Junjie Qian
Jurgen Pfeffer
Justin Pelletier
Justin Pelletier, Nuthan Munaiah, Shau-Hsuan Su, S. Jay Yang, Andrew Meneely
K. C. Klaffy
K. Herzig
K. Oliver
K. Virgil English
Kaestner, Christian
Kafalı, Özgür
Kaijie Zhu
Kambhatla, Gauri
Kami Vaniea
Kamil Nar
Kang, Eunsuk
Kapadia, Apu
Karl Goschka
Karl Reinhard
Karthik Sheshadari
Kartik Nayak
Kartik Palani
Kathleen Carley
Keefe, Ken
Keith Stouffer
Kelly, Patrick Gage
Ken Keefe, University of Illinois at Urbana-Champaign
Kenneth A. Bamberger
Kenny Wong
Kim Herzig
Kim, Donghoon
Kinneer, Cody
Kishida, Masako
Klein, Mark
Kolias, Constantinos
Komanduri, Saranga
Koronkevich, Paulette
Koutsoukos, Xenofon
Kretz, Ian D.
Kreuter, Frauke
Kristina Sojakova
Krzysztof Czarnecki
Kuan Yen Chou
Kulkarni, Prasad A.
Kurilova, Darya
Kurt Geihs
Kyle Canavera
L. Richard Carley
L. Williams
Ladan Tahvildari
Laing, Yanhui
Lakshminarayanan Subramanian
Lasse Peters
Laurie Williams
Le Goues, Claire
Le Guan
Lee, Da Young
Lee, Donggun
Lee, Joel
Leeyat Slyper
Lehker, J.M.
Lehker, Jean-Michel
Lei Yang
Leva, Alberto
Leysan Nurgalieva
Li, Fengjun
Li, Nianyu
Li, Yang
Lichao Sun
Ligia Nistor
Lim, Michael H.
Limin Jia
Lin, Weiran
Lin, Yuhang
Lingchen Zhang
Lingjing Yu
Liora Friedberg
Litoiu, Marin
Lokhov, Andrey Y.
Lorrie Cranor
Loscocco, Peter A.
Lucas, Keane
Luciano Baresi
Luis Caires
Luis G. Nardin
Luiz Carvalho
Lujo Bauer
Luo, Bo
Luo, Gang
M. A. {Noureddine}
M. F. Balcan
M. Ranzato
Maass, Michael
Maciej Kosarzecki
Madelyn Sanfilippo
Madiha Tabassum
Magnus Egerstedt, University of Illinois at Urbana-Champaign
Mahesh Tripunitara
Mahesh Viswanathan
Mahmood Sharif
Mahmood, Riyadh
Mahmoud Hammad
Mahran Al-Zyoud
Maillart, Thomas
Malek, Sam
Mancuso, Renato
Manquinho, Vasco
Marcio Ribeiro
Marco Mellia
Maria Riaz
Marian Harbach
Marin Litoiu
Maritza Johnson
Mark Appleby
Martin Becker
Martins, Ruben
Marwan Abi-Antoun
Mary Metelko
Mary Shaw
Matthew Caesar
Matthew Caesar, University of Illinois at Urbana-Champaign
Matthew Fredrikson
Matthew Hale, University of Illinois at Urbana-Champaign
Matthew Hammer
Matthew Harvey
Matthew West
Mattson, Timothy
Mauro Pezze
Mayhorn, C. B.
Mayhorn, Christopher B.
Mazurek, Michelle
Md Rayhanur Rahman
Meder, David
Mehdi Mashayekhi
Mei Liu
Melanie Zeilinger
Meng Meng
Meng, Weizhi
Mermoud, Alain
Mezzour, Ghita
Michael B. Smith
Michael Bechtel
Michael Coblenz
Michael Hilton
Michael K. Reiter
Michael Lanham
Michael Lim
Michael Maass
Michael Neises
Michael Rausch
Michael Reiter
Michelle L. Mazurek
MiklÓs MarÓti
Miles Baker
Miller, Andrew
Mingyue Zhang
Minje Kim
Mirzaei, Nariman
Mitra Bokaei Hosseini
Mitra, Sayan
Mitziu Echeverria
Mladen A. Vouk
Mladen Vouk
Mohammad A. Noureddine
Mohammad Noureddine
Mohammad Tahaei
Mohammed Alsaleh
Momin Malik
Moosa Yahyazadeh
Moreno, Gabriel A.
Morgan Evans
Mudassir Shabbir
Muhammad Saad
Munindar P. Singh
Murphy-Hill, E.
Murphy-Hill, Emerson
Myers, Brad A.
Myers, Bradley
Naeem Esfahani
Nandakishore Santhi, Los Alamos National Laboratory
Nariman Mirzaei
Narseo Vallina-Rodriguez
Nasif Imtiaz
Nathan Fulton
Nathan Malkin
Navid Mokhlesi
Nazli Choucri
Neema, Himanshu
Negin Musavi
Nelly Bencomo
Nguyen, Hoang
Nianyu Li
Nicholas Munson
Nicol, David
Nicola Gambino
Nicolas Christin
Nicole Hutchins
Nima Roohi
Ning, Peng
Ninghui Li
Nirav Ajmeri
Nissenbaum, Helen
Nistor, Ligia
Nitin Kohli
Niu, Jianwei
Norha Villegas
Norman Sadeh
Noura Alomar
Noureddine, Mohammad
Nuseibeh, Bashar
Nuthan Munaiah
Oei, Reed
Olaf Lebenich
Olga A. Zielinska
Oliva, Junier B.
Olivier Bonaventure
Olufogorehan Tunde-Onadele
Omar Chowdhury
Omar, Cyrus
Orvalho, Pedro
Oscar Nierstrasz
Ozay, Necmiye
Ozgur Kafali
P. Brighten Godfrey
Pablo A. Parrilo
Palani, Kartik
Pan Yi
Paola Inverardi
Papalexakis, Evangelos
Parnin, Chris
Partho, Asif
Pasquale, Liliana
Passaro, Timothy
Paterson, Colin
Patrick Gage Kelley
Paul Laskowski
Paul Rowe
Paulette Koronkevich
Paulo Casanova
Peng Ning
Peng, Wenxin
Percia David, Dimitri
Perry Alexander
Peter Loscocco
Peter Volgyesi
Petros Efstathopoulos
Pfeffer, Juergen
Ping Liu, Illinois Institute of Technology
Platzer, Andre
Poorvi L. Vora
Potanin, Alex
Pradeep K. Murukannaiah
Pradhan, Priysha
Prakash, B. Aditya
Prasad Kulkarni
Prateek Mittal
Price, Eric
Primal Wijesekera
Qi Li
Qi Liu
Qi Wang, University of Illinois at Urbana-Champaign
Qiang Zhou
Qiaozhi Wang
Qiben Yan
Qijing Huang
Qingyun Liu
Qiongxiao Wang
Quanwei Cai
R. Hadsell
R. Mayer
R. W. Proctor
Rada Y. Chirkova
Radu Vanciu
Raffaela Mirandola
Rahman, Akond
Rahman, Md Rayhanur
Rahman, Mohammad Ashiqur
Rahul Telang
Ralph Holz
Ram Krishnan
Raman Goyal
Ramon Alvarado
Ramsdell, John D.
Randy Bryant
Rao, Ashwini
Rashid, Awais
Rasmus Rendsvig
Ravela, Sai
Razaghpanah, Abbas
Razvan Beuran
Reardon, Joel
Rebecca K. Lively
Reed Oei
Reid Simmons
Reiter, Michael K.
Ren, Tongzheng
Renato Mancuso
Reyes, Irwin
Reyhaneh Jabbarvand
Rezvan Mahdavi-Hezaveh
Riaz, Maria
Richard Shay
Richard Skowyra
Richard Skowyra, MIT Lincoln Laboratory
Richard T. Carback
Richmond Wong
Rick Schlichting
Rivers, Anthony T.
Riyadh Mahmood
Robert Canady
Robert Harper
Robert Seacord
Robert W. Proctor
Rocky Slavin
Rodolfo Pellizzoni
Rogerio de Lemos
Rohit Gheyi
Rohit Gheyl
Romano, Paolo
Ron Desmarais
Ronald L. Rivest
Roohi, Nima
Roopak Venkatakrishnan
Rosu, Grigore
Rothermel, Gregg
Rowe, Paul D.
Roykrong Sukkerd
Ruba Abu-Salma
Ruchkin, Ivan
Rui Abreu
Rui Shu
Ruturaj Vaidya
Ryan Wagner
Ryan, Mark
S. Shankar Sastry
S. Streck
Sagar Chaki
Saikou Diallo
Sam Malek
Sam Weber
Samin Yaseer Mahmud
Sampada Deglurkar
Samuel Jero
Samuel Jero, MIT Lincoln Laboratory
Sana Awan
Sanders, William
Sanders, William H.
Sanghavi, Sujay
Sanjay Shakkottai
Santhosh Prabhu
Santhosh Prabhu, University of Illinois at Urbana-Champaign
Saqib Hasan
Sarah Helble
Sarah Nadi
Sarah Pearman
Saranga Komanduri
Saurabh Mittal
Sayan Mitra
Schaffer, Henry E.
Schahram Dustdar
Scherlis, Bill
Schmerl, Bradley
Scott Eisele
Seasholtz, Chris
Seaver Thorn
Serge Egelman
Serge Mankovskii
Sergey Gorinsky
Shahriyar Amini
Shakkottai, Sanjay
Shakthi Bachala
Shangyu Xie
Shanmugam, Karthikeyan
Sharad Seth
Sharif, Mahmood
Sharma, Nihal
Shay, Richard
Shayak Sen
Shen, Hui
Shen, Jian
Shengbin Wang
Shi, Yifeng
Shikun Zhang
Shintre, Saurabh
Shubham Goyal
Shurui Zhou
Silva, Mariana
Simin Chen
Simmons, Reid
Simon D. Parsons
Singh, Munindar P.
Slavin, Rocky
Sohaib Kiani
Somesh Jha
Somil Bansal
Sonchack, John
Sridhar Adepu
Srisa-an, Witawas
Sruti Bhagavatula
Stavrou, Angelos
Stefan Popoveniuc
Stephan Eidenbenz, Los Alamos National Laboratory
Stephanie Balzer
Stephen Broomell
Steve Awodey
Steve Uhlig
Steven Gomez
Steven Wang
Stipanović, Dušan M.
Stonebraker, Michael
Storey, Margaret-Anne
Stouffer, Keith
Strijbosch, Nard
Subramani, Shweta
Sudarshan Wadkar
Sukkerd, Roykrong
Sumukhi Chandrashekar
Sun, Dawei
Sunberg, Zachary N.
Sunshine, Joshua
Supat Rattanasuksun
Surya Tej Nimmakayala
Sven Apel
Syed Rafiul Hussain
Sylvia Herbert
Symons, John
Sze Yiu Chau
Taha Eghtesad
Tang, CheeYee
Teel, Andrew R.
Teland, Rahul
Telang, Rahul
Tembe, R.
Tembe, Rucha
Temple, William
Temple, William G.
Theisen, Christopher
Thomas Christopher King
Thomas Glazier
Thomas J. Glazier
Thomas Klemas
Thomas MacGahan
Thomas Norton
Thomas Roth
Thomas Thum
Thomas Vogel
Thomas Wies
Thorsten Berger
Tianyuan Ding
Tien Nguyen
Timothy Darrah
Timothy Passaro
Timothy Vidas
Tina Balke-Visser
Ting Dai
Tingting Yu
Tomasz Kosiundefinedski
Tomlin, Claire J.
Travis Breaux
Travis Mayberry
Troy Shaw
Tucker, Johnathan
Tudor Dumitras
Tunde-Onadele, Olufogorehan
Tyler Etzel
Ujcich, Benjamin
undefined
Ur, Blase
Uttam Thakore
Uttam Thakore, University of Illinois at Urbana-Champaign
Vaclav Rajlich
Vaidya, Ruturaj
Vallina-Rodriguez, Narseo
Valsan, Prathap Kumar
Vangaveeti, Anoosha
Varun Tolani
Venkatakrishnan, Roopak
Victor Heorhiadi
Vidas, Timothy
Vincenzo Grassi
Vishal Dwivedi
Viswanathan, Mahesh
Vouk, Mladen A.
Vouk. Mladen A
Vuffray, Marc
Vyas Sekar
W. Boettcher
W. G. {Temple}
W. H. {Sanders}
Wagner, Ryan
Wang, Ding
Wang, Fusheng
Wang, Guilin
Wang, Leqiang
Wang, Yu
Waqar Ahmad
Waqar Ali
Waseem Abbas
Weicheng Wang
Weining Yang
Welk, A.
Wenqiang Li
West, Andrew
West, Andrew G
West, Matthew
Weyns, Danny
Whitney Nelson
Wijesekera, Primal
Wilhelm Schafer
William Enck
William G. Temple
William G. Temple, Advance Digital Science Center Singapore
William H. Sanders
William H. Sanders, University of Illinois at Urbana-Champaign
William Sanders
William Scherlis
Williams, Laurie
Wise, Jenna
Witawas Srisa-an
Wohlrab, Rebekka
Xe, G.
Xenofon D. Koutsoukos
Xenofon Kousoukos
Xenofon Koutsoukos
Xianqing Yu
Xiaohui Gu
Xiaokun Zhang
Xiaoliang Wu
Xiaoyin Wang
Xin Liu
Xin Liu, Illinois Institute of Technology
Xingyu Zhou
Xuhua Bao
Yan Shvartzshnaider
Yanfeng Qu
Yang Li
Yang, Lei
Yang, Shuo
Yangfend Qu, Illinois Institute of Technology
Yangqingwei Shi
Yannick Bloem
Yaodong Yang
Yasin Yazıcıoğlu
Yasuo Tan
Yevgeniy Vorobeychik
Yi Li
Yibin Wang
Yifeng Shi
Yu Pan
Yu Wang
Yu Wang, University of Illinois at Urbana-Champaign
Yu Xianqing
Yu, Tingting
Yuan Hong
Yuan Hong, Illinois Institute of Technology
Yuan-An Liu
Yuhang Lin
Yun, Heechul
Yuriy Brun
Yutaka Tsutano
Zachary Sunberg
Zack Coker
Zawadzki, Erik
Zhang, Changjian
Zhang, Mingyue
zhao, ellin
Zhaoyu Zhou
Zhengkai Zhang
Zhenkai Zhang
Zhenxiang Chen
Zhiqiang Li
Zielinska, O.
Zielinska, Olga A.
Zihao Zhan
Zins, Stefan
Zvonimir Pavlinovic
Conference Paper
Magazine Article
Journal Article
Conference Proceedings
Book
Web Article
Miscellaneous
Thesis
Book Chapter
Presentation
Report
Unpublished
Keywords - : concurrency
Keywords - #ifdef
Keywords - #SAT
Keywords - 2018: July
Keywords - 2018: October
Keywords - 2019: April
Keywords - 2019: January
Keywords - 2019: July
Keywords - 2019: October
Keywords - 2020: April
Keywords - 2020: January
Keywords - 2020: July
Keywords - 2020: October
Keywords - 2021: April
Keywords - 2021: January
Keywords - 2021: July
Keywords - 2021: October
Keywords - 34K35
Keywords - 49L12
Keywords - 5G mobile communication
Keywords - 5G mobile networks
Keywords - 93D21
Keywords - A Human-Agent-Focused Approach to Security Modeling
Keywords - A Language and Framework for Development of Secure Mobile Applications
Keywords - a priori unknown environments
Keywords - Abstracts
Keywords - Access Control
Keywords - access policies
Keywords - Acoustics
Keywords - active cyber defense
Keywords - Adaptation models
Keywords - Adaptive Autonomy
Keywords - adaptive security
Keywords - Adaptive software
Keywords - Adaptive system; Uncertainty; Uncertainty awareness; Uncertainty reduction; Decision making
Keywords - adaptive systems
Keywords - Address space randomization
Keywords - advanced persistent threat
Keywords - adversarial attacks
Keywords - adversarial examples
Keywords - Agency
Keywords - Aggregates
Keywords - AIOps
Keywords - Air gaps
Keywords - air-gapped computer
Keywords - Algorithms
Keywords - alias control
Keywords - aliasing
Keywords - always listening
Keywords - analysis
Keywords - Analytic Hierarchy Process.
Keywords - Analytical models
Keywords - and empirical study
Keywords - and Grounded Theory
Keywords - android
Keywords - Android application
Keywords - Android applications
Keywords - Android Malware Detection
Keywords - Android permissions
Keywords - Android platform
Keywords - Anomaly Detection
Keywords - anomaly detection systems
Keywords - Ansible
Keywords - anti-virus
Keywords - app
Keywords - App Reviews
Keywords - app store
Keywords - approximate bisimulation
Keywords - Approximation algorithms
Keywords - Apr'15
Keywords - Apr'16
Keywords - Apr'17
Keywords - architectural design
Keywords - architectural extraction
Keywords - Architectures
Keywords - Artificial Intelligence (cs.AI)
Keywords - assets
Keywords - attack graph
Keywords - attack surface
Keywords - Attack Surface and Defense-in-Depth Metrics
Keywords - attacker
Keywords - attacker model
Keywords - attacks
Keywords - attestation protocol manager
Keywords - attestation protocols
Keywords - auditing
Keywords - August'17
Keywords - authentication
Keywords - authentication infrastructure
Keywords - authorisation
Keywords - authority
Keywords - authorization
Keywords - automata
Keywords - automated planning
Keywords - Automated Synthesis Framework for Network Security and Resilience
Keywords - Automated Synthesis of Resilient Architectures
Keywords - Automated Testing
Keywords - automobiles
Keywords - Autonomic computing
Keywords - Autonomic Security
Keywords - autonomous systems
Keywords - autonomous vehicles
Keywords - autonomy
Keywords - Bandwidth
Keywords - battery-operated
Keywords - Benchmark testing
Keywords - biased efficiency metric
Keywords - biconnected home network centrality
Keywords - bidirectional type systems
Keywords - bidirectional typechecking
Keywords - Biological system modeling
Keywords - Biomedical monitoring
Keywords - BitJabber
Keywords - Blochchain
Keywords - block-based programming
Keywords - blockchain
Keywords - Bluetooth
Keywords - Broadcast Authentication
Keywords - Browsers
Keywords - brute fact
Keywords - bug
Keywords - build automation tools
Keywords - build automation tools; survey; practitioners
Keywords - Build system; Autotools; Autoconf; Build analysis
Keywords - Buildings
Keywords - C Preprocessor
Keywords - C preprocessor · cppstats · variability · configurable systems · open-source systems · industrial systems · software product lines
Keywords - C. D. Broad
Keywords - callgraph
Keywords - capabilities
Keywords - capability safety
Keywords - Capacitors
Keywords - card tap logs
Keywords - Cascading Failures
Keywords - case study
Keywords - category
Keywords - causation concept
Keywords - Cellular networks
Keywords - cellular radio
Keywords - centerpoint
Keywords - certificate
Keywords - certificate services
Keywords - certificate transparency
Keywords - certification
Keywords - certification authorities
Keywords - CFG-represented malware programs
Keywords - chef
Keywords - circuit-level treatment
Keywords - circuit-level verification
Keywords - classes
Keywords - classification
Keywords - classifier
Keywords - classroom courses
Keywords - Clocks
Keywords - Cloud Computing
Keywords - cloud computing infrastructures
Keywords - Cloud-Assisted IoT Systems Privacy
Keywords - clustering
Keywords - Clustering Decision tree learning
Keywords - CMU
Keywords - code metrics
Keywords - cognition
Keywords - cognitive science
Keywords - collaboration
Keywords - collaboration platform
Keywords - Collaborative Intrusion Detection Systems
Keywords - collision avoidance
Keywords - Color
Keywords - Commitments
Keywords - Communication networks
Keywords - Communication system signaling
Keywords - Community discovery
Keywords - comparative evaluation
Keywords - Comparative Sentences
Keywords - Complexity theory
Keywords - Compliance
Keywords - Component Compositions
Keywords - Component-Based Software
Keywords - composability
Keywords - computational complexity
Keywords - Computational modeling
Keywords - computer aided instruction
Keywords - Computer bugs
Keywords - Computer crime
Keywords - computer network management
Keywords - computer science
Keywords - computer science education
Keywords - computer security
Keywords - Computer simulation
Keywords - computing methodologies
Keywords - Concurrency
Keywords - concurrency faults
Keywords - confidence-aware human motion predictions
Keywords - Configurable Software
Keywords - Configurable Systems
Keywords - configuration as code
Keywords - configuration complexity
Keywords - configuration constraints
Keywords - configuration options
Keywords - configuration scripts
Keywords - Consensus algorithm
Keywords - consent
Keywords - constraints
Keywords - consumer
Keywords - consumer expectations
Keywords - container
Keywords - Container Security
Keywords - container vulnerability exploit detection
Keywords - Containers
Keywords - Context
Keywords - contextual integrity
Keywords - Contextual Integrity for Computer Systems
Keywords - contracts
Keywords - control flow graph
Keywords - control flow graphs
Keywords - control systems
Keywords - Controllability
Keywords - convergence
Keywords - convolution
Keywords - convolutional neural nets
Keywords - coordinated analysis
Keywords - Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure
Keywords - corpus analysis; object-oriented metrics; points-to analysis; heap abstractions
Keywords - correctness
Keywords - counting
Keywords - Couplings
Keywords - courses of action
Keywords - COVID-19; data sharing for the public good
Keywords - CPP
Keywords - CPS Domains
Keywords - CPS Technologies
Keywords - crashes
Keywords - Credentials in repositories
Keywords - critical equipment
Keywords - critical infrastructure facilities
Keywords - critical infrastructures
Keywords - critically oriented design
Keywords - crowdsourcing
Keywords - Cryptoeconomics
Keywords - Cryptography
Keywords - cyber physical systems
Keywords - cyber resilience and security
Keywords - cyber security
Keywords - cyber threats
Keywords - cyber-attack
Keywords - cyber-physical system
Keywords - cyber-physical system safety
Keywords - cyber-physical systems
Keywords - Cyber-physical systems; analysis contracts; sensor; control
Keywords - Cyber-security
Keywords - cyberattack
Keywords - Cybersecurity
Keywords - Cybersecurity data sharing; risk perception; data usage; personal privacy
Keywords - cybersecurity; attack surface
Keywords - Cyberspace
Keywords - data analysis
Keywords - data breaches
Keywords - Data Exfiltration
Keywords - data flow analysis
Keywords - data flows
Keywords - data integrity
Keywords - Data Leakage Detection
Keywords - Data mining
Keywords - data plane programs
Keywords - Data processing
Keywords - data provenance
Keywords - Data Races
Keywords - Data Security
Keywords - data space randomization
Keywords - data usage
Keywords - Data visualization
Keywords - Databases
Keywords - DBT system
Keywords - Decision Making
Keywords - decision-making
Keywords - deep graph convolutional neural network
Keywords - deep learning
Keywords - defect
Keywords - defense strategies
Keywords - Degradation
Keywords - demographic information
Keywords - Denial-of-Service
Keywords - dependencies
Keywords - dependency
Keywords - Dependency management
Keywords - design
Keywords - design approaches
Keywords - Design patterns
Keywords - Design Research
Keywords - design studio
Keywords - detailed electric distribution system
Keywords - DevOps
Keywords - Devops Configuration as code Configuration script Continuous deployment Infrastructure as code Software engineering Systematic mapping study
Keywords - devsecops
Keywords - Diagnosis
Keywords - Digital audio broadcasting
Keywords - digital communication
Keywords - Digital Forensics
Keywords - digital world
Keywords - dimensionality reduction
Keywords - Disruptive Changes
Keywords - distributed computing
Keywords - Distributed databases
Keywords - distributed systems
Keywords - distribution networks
Keywords - diverse access technologies
Keywords - diverse cloud monitors
Keywords - diverse network technologies
Keywords - diversity
Keywords - diversity reception
Keywords - DLP
Keywords - Docker Images
Keywords - domain adaptation
Keywords - domain expertise
Keywords - domainsensitivity
Keywords - dominating sets
Keywords - DRAM chips
Keywords - DRAM clock
Keywords - DRAM controller
Keywords - dynamic analysis
Keywords - dynamic anomaly detection scheme
Keywords - Dynamic attack
Keywords - Dynamic binary translation
Keywords - Dynamic Binary Translation system
Keywords - Dynamic Binary translators
Keywords - dynamic game theory
Keywords - dynamic vulnerability attack detection schemes
Keywords - Dynamical Systems (math.DS)
Keywords - ECDH
Keywords - Ecosystem
Keywords - edge networks
Keywords - editorial
Keywords - education
Keywords - educational courses
Keywords - effective smart grid related characteristics
Keywords - Electrical power system simulation
Keywords - electricity market
Keywords - Electricity supply industry
Keywords - electromagnetic signals
Keywords - electronic engineering
Keywords - Electronic mail
Keywords - EM
Keywords - embedded Linux
Keywords - emergence
Keywords - emergent properties
Keywords - empirical
Keywords - Empirical Development of Patterns
Keywords - empirical evaluation
Keywords - Empirical Models for Vulnerability Exploits
Keywords - Empirical studies of programmers
Keywords - empirical studies of programming languages
Keywords - empirical study
Keywords - emulation
Keywords - emulators
Keywords - enterprise cloud administrators
Keywords - Entitlements
Keywords - environmental uncertainty
Keywords - EPC
Keywords - Epistemology
Keywords - estimation
Keywords - ethereum
Keywords - evidential reasoning
Keywords - Evolving Software
Keywords - experiment design
Keywords - experimental platform-as-a-service cloud
Keywords - Explainable Planning
Keywords - explainable software
Keywords - Exploratory Testing
Keywords - extensibility
Keywords - extensible languages
Keywords - extensible syntax; macros; hygiene; type inference
Keywords - face recognition
Keywords - failure-prone circumstances
Keywords - false data injection attack
Keywords - feature extraction
Keywords - feature interaction
Keywords - federated learning
Keywords - fine-grained policies
Keywords - firewall
Keywords - first-class classes
Keywords - flow graphs
Keywords - foreign function interfaces
Keywords - Forensic logging
Keywords - formal analysis
Keywords - Formal Approaches to the Ontology & Epistemology of Resilience
Keywords - formal methods
Keywords - formal models
Keywords - formal multidimensional multilayer
Keywords - Formal Specification and Analysis of Security-Critical Norms and Policies
Keywords - formal verification
Keywords - FOS: Computer and information sciences
Keywords - FOS: Electrical engineering
Keywords - FOS: Mathematics
Keywords - foundations
Keywords - Foundations of a CPS Resilience
Keywords - fraud
Keywords - fraudulent TLS server certificates
Keywords - free
Keywords - functional perspectives
Keywords - fundamental metrics
Keywords - fundamentality
Keywords - Future Internet of Things (IoT)
Keywords - future networks
Keywords - Fuzzy logic
Keywords - game theory
Keywords - Games
Keywords - gang scheduling
Keywords - GDPR
Keywords - General Data Protection Regulation
Keywords - Generators
Keywords - generic malware classification systems
Keywords - geographic perspectives
Keywords - Global Positioning System
Keywords - Governance for Big Data
Keywords - gradient methods
Keywords - gradual typing
Keywords - graph analysis
Keywords - graph convolution
Keywords - graph matching techniques
Keywords - graph typology
Keywords - grid resilience
Keywords - GridLAB-D
Keywords - groupware
Keywords - Guidelines
Keywords - Hamilton-Jacobi reachability
Keywords - handcrafted features
Keywords - handcrafted malware features
Keywords - Handheld computers
Keywords - Hardcoded secrets
Keywords - Hardware
Keywords - hardware accelerated cryptography module
Keywords - hardware faults
Keywords - hardware-in-the-loop
Keywords - hedging
Keywords - heterogeneous monitor data
Keywords - heterogeneous protocols
Keywords - heterogeneous technologies
Keywords - Heuristic algorithms
Keywords - hierarchical object graphs
Keywords - high-level architecture
Keywords - high-order system dynamics
Keywords - Highly Configurable Systems
Keywords - HIPAA
Keywords - home automation
Keywords - homotopy theory
Keywords - host machine
Keywords - HTTP Network Traffic
Keywords - Human behavior
Keywords - Human Factors
Keywords - human motion prediction
Keywords - human movement
Keywords - human-in-the-loop
Keywords - human-robot interaction
Keywords - human-robot interaction and collaboration
Keywords - hygiene
Keywords - hypernym
Keywords - Hyponym
Keywords - IBN
Keywords - ICSI
Keywords - Identity management
Keywords - Identity provider
Keywords - IdP-issued ticket
Keywords - IDS
Keywords - Image Processing
Keywords - Immutability
Keywords - Incident Response
Keywords - Indexes
Keywords - indoor location
Keywords - information diffusion
Keywords - information engineering
Keywords - Information Flow Control
Keywords - information sharing
Keywords - infrastructure as code
Keywords - initial algebras.
Keywords - Input Generation
Keywords - input sanitation
Keywords - Input variables
Keywords - insecure coding
Keywords - Instruction Set Randomization
Keywords - Instruction sets
Keywords - integrated circuits
Keywords - intent provenance model
Keywords - intent semantics
Keywords - intent-based networking
Keywords - intent-driven network application
Keywords - Inter-App vulnerabilities
Keywords - Interactive Explanation
Keywords - interference control
Keywords - internet
Keywords - Internet of Things
Keywords - Internet of Things (IoT)
Keywords - Internet security
Keywords - Interviews
Keywords - Intrusion Detection
Keywords - invasive software
Keywords - IoT
Keywords - IoT topology
Keywords - Iterative methods
Keywords - Jan'15
Keywords - Jan'16
Keywords - Jan'17
Keywords - January 2020
Keywords - Java sandbox
Keywords - JIT
Keywords - July'14
Keywords - July'15
Keywords - July'16
Keywords - July'17
Keywords - Just-in-Time
Keywords - Kernel
Keywords - kernel debugging
Keywords - Kernels
Keywords - key management
Keywords - knowledge transfer
Keywords - KU
Keywords - language-based security
Keywords - Laplace equations
Keywords - Law
Keywords - layered attestation
Keywords - learning (artificial intelligence)
Keywords - learning-based planner
Keywords - Learning-enabled components; Prediction confidence; Conformal prediction
Keywords - legitimate communication channels
Keywords - Linear systems
Keywords - linear types
Keywords - linearity
Keywords - link removals
Keywords - Linux
Keywords - Linux kernel
Keywords - Literature Review
Keywords - Load flow
Keywords - load forecast
Keywords - load forecasting
Keywords - Load modeling
Keywords - log analysis
Keywords - log clustering
Keywords - Logic gates
Keywords - low-bit-rate services
Keywords - machine learning
Keywords - Machine Learning (cs.LG)
Keywords - Machine Learning (stat.ML)
Keywords - Magnetoacoustic effects
Keywords - malware
Keywords - malware analysis methods
Keywords - Malware Clas- sification
Keywords - malware classification
Keywords - malware detection
Keywords - Malware propagation
Keywords - Markov Decision Process Planning
Keywords - Markov processes
Keywords - massively open online courses
Keywords - Mathematical model
Keywords - MATLAB
Keywords - Meaning
Keywords - Measurement
Keywords - mechanized metatheory
Keywords - Mental model
Keywords - metadata
Keywords - Metamodeling
Keywords - metamodels
Keywords - metaphysical accounts
Keywords - metaprogramming
Keywords - Meters
Keywords - metric data
Keywords - Metrics
Keywords - Micro-architecture
Keywords - microarchitectural attacks
Keywords - microgrid
Keywords - microsoft windows
Keywords - Microwave integrated circuits
Keywords - mirrors
Keywords - Mobile app
Keywords - Mobile Apps
Keywords - mobile payment security
Keywords - Mobile Permissions
Keywords - mobile radio
Keywords - mobile robots
Keywords - Mobile Security
Keywords - model checking
Keywords - Model degradation
Keywords - model-based design
Keywords - Model-Based Explanation For Human-in-the-Loop Security
Keywords - model-based graph clustering
Keywords - modeling
Keywords - modeling and simulation
Keywords - models
Keywords - modules
Keywords - Monitoring, Fusion, and Response for Cyber Resilience
Keywords - MOOC format
Keywords - MOOCs
Keywords - motion planning
Keywords - movement scenarios
Keywords - moving target defense
Keywords - moving target defenses
Keywords - Mozilla Firefox
Keywords - multi-core machines
Keywords - multi-robot systems
Keywords - multiagent systems
Keywords - Multicore Processors
Keywords - multidimensional multilayer network
Keywords - multimodal interaction
Keywords - multiprocessing systems
Keywords - multirobot multihuman collision avoidance
Keywords - multitask estimation
Keywords - multithreading
Keywords - Mutability
Keywords - National Institute of Standards and Technology Interagency Report
Keywords - natural language parsing
Keywords - natural language processing
Keywords - navigation
Keywords - NCSU
Keywords - Net energy (NE)
Keywords - NetLearner
Keywords - netsblox
Keywords - network analysis
Keywords - network connectivity
Keywords - network design principles
Keywords - Network diagnostics
Keywords - Network Emulation
Keywords - network intrusion detection systems
Keywords - network management
Keywords - network operating system
Keywords - network resilience
Keywords - network robustness
Keywords - network structure
Keywords - network theory (graphs)
Keywords - network topology
Keywords - Network Troubleshooting
Keywords - network verification
Keywords - network virtualization
Keywords - network visibility
Keywords - networked system
Keywords - networked system control
Keywords - networks
Keywords - neural nets
Keywords - neural network
Keywords - Neural networks
Keywords - Neurocosmetics
Keywords - Neurons
Keywords - NIDS
Keywords - NISTIR 7628
Keywords - node removals
Keywords - node types
Keywords - nominal and structural types
Keywords - Non-Functional Requirements
Keywords - nonadaptive graph matching techniques
Keywords - nonSSO authentication services
Keywords - Normative reasons
Keywords - Norms
Keywords - NSA SoS Lablets Materials
Keywords - object graphs; ownership type inference; graph query
Keywords - Object recognition
Keywords - object-oriented
Keywords - Object-oriented programming; frameworks; interoperability; service abstractions
Keywords - objective function
Keywords - objectives
Keywords - objects
Keywords - Observability
Keywords - Obsidian Language for Blockchain
Keywords - Oct'14
Keywords - Oct'15
Keywords - Oct'16
Keywords - October'17
Keywords - older adults
Keywords - on-campus course
Keywords - on-campus software security course
Keywords - online learning
Keywords - Ontology
Keywords - operational environments
Keywords - Operationalizing Contextual Data
Keywords - Operationalizing Contextual Integrity
Keywords - optical receivers
Keywords - optimal control
Keywords - optimization
Keywords - Organizations
Keywords - ownership
Keywords - ownership types
Keywords - P4AIG
Keywords - PaaS
Keywords - Paging Procedure
Keywords - paid
Keywords - Pairwise connectivity
Keywords - parallel
Keywords - Parallel garbage collection; Work stealing
Keywords - parallel processing
Keywords - parallel programming
Keywords - parallel tasks
Keywords - parameter selection
Keywords - parameter synthesis
Keywords - parameterizable state automaton templates
Keywords - parsing
Keywords - Partial Models
Keywords - Partitioning algorithms
Keywords - password
Keywords - passwords
Keywords - Path Planning
Keywords - pattern classification
Keywords - pattern matching
Keywords - Patterns
Keywords - patterns security security requirements
Keywords - pay for privacy
Keywords - Payment Channels
Keywords - Performance
Keywords - permission models
Keywords - permissions
Keywords - Phasor Measurement Unit
Keywords - phasor measurement unit (PMU)
Keywords - Phasor measurement units
Keywords - philosophy of chemistry
Keywords - phishing attacks
Keywords - physical access logs
Keywords - physical access system
Keywords - Physical attack
Keywords - physical constraints
Keywords - physical covert channels
Keywords - physical data sources
Keywords - physical environment
Keywords - Physical layer
Keywords - physical obstacles
Keywords - Pins
Keywords - pipeline processing
Keywords - Pipelines
Keywords - Planning
Keywords - platforms
Keywords - Policy
Keywords - policy evaluation
Keywords - Policy-Governed Secure Collaboration
Keywords - power engineering computing
Keywords - Power Grid
Keywords - power markets
Keywords - Power measurement
Keywords - power system
Keywords - power system economics
Keywords - power system observability
Keywords - power system reliability
Keywords - power system security
Keywords - power systems
Keywords - Power systems; Adversarial attacks; Load forecasting; Dynamic data repair
Keywords - power-grid security
Keywords - power-grid security and resilience
Keywords - Power-grid simulation
Keywords - practitioners
Keywords - precedence constraints
Keywords - precise attack
Keywords - Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
Keywords - prediction
Keywords - prediction models
Keywords - Predictive models
Keywords - Preferred Entities
Keywords - preprocessors
Keywords - principal component analysis
Keywords - Principle of Sufficient Reason
Keywords - Principles of Secure BootStrapping for IoT
Keywords - privacy
Keywords - privacy and security
Keywords - Privacy as expectations
Keywords - privacy attitudes; contextual integrity
Keywords - privacy by design
Keywords - privacy classification
Keywords - Privacy Incidents Database
Keywords - Privacy Policies
Keywords - Privacy Policy
Keywords - privacy principles
Keywords - Privacy summary
Keywords - proactive security reviews
Keywords - Probabilistic logic
Keywords - Probabilistic Model Checking
Keywords - probabilistic planning
Keywords - processes
Keywords - program analysis
Keywords - program binaries
Keywords - program compilers
Keywords - program debugging
Keywords - program editors; type systems; live programming; program prediction
Keywords - program interpreters
Keywords - program translations parallelization
Keywords - program verification
Keywords - programmable data planes
Keywords - Programmer productivity
Keywords - Programming language design
Keywords - programming language evaluation
Keywords - Programming language usability
Keywords - protocol
Keywords - Protocols
Keywords - PROV
Keywords - PRovINTENT
Keywords - Prudence
Keywords - psychology
Keywords - pubcrawl
Keywords - Public key
Keywords - public key cryptography
Keywords - public key infrastructure
Keywords - puppet
Keywords - qualitative analysis
Keywords - Qualitative research
Keywords - qualitative studies
Keywords - quality attributes
Keywords - quantifier alternation
Keywords - quiz scores
Keywords - r-robustness
Keywords - race conditions
Keywords - Race Vulnerability Study and Hybrid Race Detection
Keywords - radar detection
Keywords - Rail transportation
Keywords - railway infrastructure
Keywords - railway signaling system
Keywords - railway station
Keywords - railway transportation system
Keywords - railways
Keywords - Random access memory
Keywords - Random faults
Keywords - random sampling
Keywords - RASA
Keywords - raw binary files
Keywords - reachability analysis
Keywords - real-time
Keywords - Real-time Privacy Risk Evaluation and Enforcement
Keywords - real-time systems
Keywords - reality concept
Keywords - Reasoning about Accidental and Malicious Misuse via Formal Methods
Keywords - reasoning about conflicts
Keywords - recommender system
Keywords - Redundancy
Keywords - Refactoring
Keywords - reflection
Keywords - regression testing
Keywords - Regular expressions
Keywords - Relational Logic
Keywords - relationship
Keywords - Reliability
Keywords - reliability models
Keywords - rely-guarantee
Keywords - relying party
Keywords - Remote Attestation
Keywords - Requirements
Keywords - requirements analysis
Keywords - requirements engineering
Keywords - requirements engineering; patterns; patternmining; abstraction
Keywords - requirements validation
Keywords - requirements; security; privacy; usability; literature survey
Keywords - resilience
Keywords - Resilience Requirements, Design, and Testing
Keywords - Resiliency
Keywords - resilient aggregation
Keywords - Resilient Architectures
Keywords - resilient consensus
Keywords - Resilient Control of Cyber-Physical Systems with Distributed Learning
Keywords - Resilient Cyberphysical Systems
Keywords - Resilient diffusion
Keywords - Resilient distributed learning and optimization
Keywords - resource management
Keywords - reverse-engineering
Keywords - Risk
Keywords - risk management
Keywords - risk perception.
Keywords - risk-based attack surface approximation
Keywords - Robot kinematics
Keywords - robot navigation
Keywords - Robot sensing systems
Keywords - robot vision
Keywords - robotics
Keywords - Robotics (cs.RO)
Keywords - robotics literature
Keywords - robust control
Keywords - robust control models
Keywords - robust graphs
Keywords - robust motion planning
Keywords - robust network construction
Keywords - Robustness
Keywords - Root cause analysis
Keywords - rowhammer
Keywords - run-time
Keywords - Runtime
Keywords - runtime verification
Keywords - safe autonomous navigation
Keywords - Safety
Keywords - safety analysis
Keywords - safety critical
Keywords - Safety Critical ML
Keywords - safety-critical software
Keywords - Safety-Critical Systems
Keywords - sampling
Keywords - sampling error
Keywords - Samuel Alexander
Keywords - sanctions
Keywords - sandboxing
Keywords - satisfiability
Keywords - Scalability and Composability
Keywords - Scalable Privacy Analysis
Keywords - Scalable Trust Semantics & Infrastructure
Keywords - scale-out
Keywords - scenarios
Keywords - Science of Secure Frameworks
Keywords - Science of Security
Keywords - scientific accounts
Keywords - SDN
Keywords - SDN control
Keywords - SDN diagnostics tool
Keywords - SDN network forensics
Keywords - Secret detection tool
Keywords - Secrets in repositories
Keywords - Secure Composition of Systems and Policies
Keywords - secure control systems
Keywords - Secure Cyberphysical Systems
Keywords - security
Keywords - Security analysis
Keywords - security and privacy risk
Keywords - security and resilience
Keywords - security assessment
Keywords - security behavior
Keywords - Security Behavior Observatory
Keywords - Security behavior; measurement; user studies
Keywords - Security decision-making patterns requirements analysis situation awareness
Keywords - security designs
Keywords - Security feature diagram patterns requirements
Keywords - Security Metrics
Keywords - Security Metrics Driven Evaluation, Design, Development, and Deployment
Keywords - security models
Keywords - security of data
Keywords - security patching
Keywords - security requirements
Keywords - security requirements patterns
Keywords - security services
Keywords - security tools
Keywords - security vulnerabilities
Keywords - Security VulnerabilityMining Software RepositoriesSoftware Analysis
Keywords - Security; Human Factors; Psychology; Analogical Transfer
Keywords - security; non-interference; authorized declassi- fication; epistemic logic
Keywords - security; requirements; patterns; analysis; decision-making; ysituation awareness
Keywords - security; usable security; risk homeostasis theory; risk compensation
Keywords - self-* properties
Keywords - Self-Adaptation
Keywords - Self-adaptation.
Keywords - self-adaptive systems
Keywords - Self-adaptive systems; Diagnostics; Monitoring
Keywords - self-driving infrastructure
Keywords - Self-protection
Keywords - Self-Protection; Software Architecture; Software Security
Keywords - semantic versioning
Keywords - Semantics
Keywords - sensitivity analysis
Keywords - sensors
Keywords - sequence diagram
Keywords - sequential circuit analysis
Keywords - sequential circuits
Keywords - sequential priority ordering
Keywords - Servers
Keywords - service infrastructure control
Keywords - Session types; Linear logic; Process calculi; Strong normalization; Confluence; Logical relations; Observational equivalences
Keywords - Shape
Keywords - shared cache
Keywords - shared memory systems
Keywords - Side-channel attack
Keywords - Side-Channel Attack Resistance
Keywords - significant manual effort
Keywords - simulation
Keywords - simulation environments
Keywords - simulation tools
Keywords - single sign-on
Keywords - single sign-on services
Keywords - Situation Awareness
Keywords - smart contract languages
Keywords - smart contracts
Keywords - smart environment
Keywords - Smart Grid
Keywords - smart grid cyber security guidelines
Keywords - Smart Grid Privacy
Keywords - Smart Grids
Keywords - Smart Home
Keywords - Smart homes
Keywords - smart infrastructure
Keywords - Smart Isolation in Large-Scale Production Computing Infrastructures
Keywords - smart meters
Keywords - smart power grids
Keywords - smart-city environments
Keywords - smart-grids
Keywords - smart-home
Keywords - smell
Keywords - snap!
Keywords - social engineering
Keywords - social network analysis
Keywords - social networking (online)
Keywords - social norms
Keywords - socio-technical factors
Keywords - Sociology
Keywords - sociotechnical systems
Keywords - Software
Keywords - Software Architecture
Keywords - software architecture; architectural control; distributed systems; capabilities; layered architectures; alias control; domain specific languages
Keywords - software composition analysis
Keywords - software defined networking
Keywords - Software Defined Networks
Keywords - Software dependability
Keywords - software development lifecycle
Keywords - Software ecosystems
Keywords - software ecosystems; notification feeds; information overload; transparent environments; anomaly detection
Keywords - software engineering
Keywords - software fault tolerance
Keywords - Software patterns
Keywords - software protection
Keywords - software quality
Keywords - software security coursework
Keywords - software security material
Keywords - Software Security Metrics
Keywords - Software systems
Keywords - Software Testing
Keywords - software-defined networking
Keywords - Software-defined networking (SDN)
Keywords - SoS Lablet Research Methods, Community Development and Support
Keywords - sparse networks
Keywords - Special issues and sections
Keywords - Spectre
Keywords - SSO services
Keywords - SSO ticket
Keywords - Stack traces
Keywords - Stackelberg Security Game
Keywords - startup overhead
Keywords - startup performance improvement
Keywords - state
Keywords - state estimation
Keywords - state feedback
Keywords - State Space Exploration
Keywords - State Space Reduction
Keywords - State Space Size Estimation
Keywords - static analyses
Keywords - static analysis
Keywords - Static attack
Keywords - static type checking
Keywords - static verification
Keywords - static vulnerability attack detection schemes
Keywords - Statistical Model Checking
Keywords - Steady-state
Keywords - Stimulated emission
Keywords - stochastic games
Keywords - storage management
Keywords - string sanitation
Keywords - structural health monitoring
Keywords - structural robustness
Keywords - structure editors
Keywords - student motivations
Keywords - supply chain security
Keywords - surrogate models
Keywords - survey
Keywords - Surveys
Keywords - survivability model
Keywords - Switches
Keywords - symbolic model checking
Keywords - Synchronization
Keywords - Syntactics
Keywords - system behavior
Keywords - systematic literature review
Keywords - Systems and Control (eess.SY)
Keywords - tags
Keywords - tailgating
Keywords - Task Analysis
Keywords - taxonomy
Keywords - Taxonomy and Survey
Keywords - teaching
Keywords - technical information
Keywords - technological interdependency
Keywords - technology interdependence graph
Keywords - technology-level perspectives
Keywords - telecommunication control
Keywords - telecommunication network reliability
Keywords - telecommunication network topology
Keywords - templates
Keywords - Temporal Logic
Keywords - temporal reasoning
Keywords - test efforts
Keywords - testbed
Keywords - testing
Keywords - Text Mining
Keywords - theoretical completeness
Keywords - threat indicators
Keywords - Time/Fidelity trade-offs
Keywords - timed automata
Keywords - TLS handshakes
Keywords - TLS man-in-the-middle attacks
Keywords - tools
Keywords - Topology
Keywords - tracking
Keywords - Trade-Offs
Keywords - Tradeoff analysis
Keywords - traditional software verification techniques
Keywords - Training
Keywords - Training data
Keywords - Trajectory
Keywords - trajectory control
Keywords - trajectory planning
Keywords - transactive energy
Keywords - transactive energy market
Keywords - Transportation network
Keywords - trust
Keywords - Trust management
Keywords - trust model
Keywords - trust-enhancements
Keywords - Trusted Computing
Keywords - trusted nodes
Keywords - trusted third party
Keywords - trustiness
Keywords - Two dimensional displays
Keywords - type declarations
Keywords - type inference
Keywords - type systems
Keywords - Type theory
Keywords - type-2
Keywords - typestate
Keywords - typestates
Keywords - UIUC
Keywords - UMD
Keywords - unauthorized data transfer
Keywords - unauthorized physical access
Keywords - uncertainty
Keywords - Uncertainty in Security Analysis
Keywords - Uncertainty Quantification
Keywords - underlying network structure
Keywords - Understanding and Accounting for Human Behavior
Keywords - Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Keywords - update criteria
Keywords - usability of programming languages
Keywords - usability; key fingerprints; authentication; secure messaging
Keywords - Usable Security
Keywords - USE: User Security Behavior
Keywords - user study
Keywords - user study; vignettes; scenarios; security requirements; requirements elicitation
Keywords - User-Centered Design
Keywords - user-centered programming language design
Keywords - utility functions
Keywords - Utility-privacy tradeoff
Keywords - vagueness
Keywords - value
Keywords - Variability models
Keywords - Variability-Aware Execution
Keywords - Variational data structures
Keywords - vehicle dynamics
Keywords - vehicles
Keywords - verification
Keywords - vignettes
Keywords - Violation Detection
Keywords - Virtual machine monitors
Keywords - virtual platforms
Keywords - Virtual Time
Keywords - Virtualization
Keywords - vision-based planner
Keywords - visual programming
Keywords - visualization
Keywords - voice assistants
Keywords - VU
Keywords - vulnerabilities
Keywords - Vulnerability
Keywords - Vulnerability and Resilience Prediction Models
Keywords - Vulnerability Propagation
Keywords - W3C PROV-DM
Keywords - Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Keywords - Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
Keywords - web security
Keywords - Weight measurement
Keywords - Well-being
Keywords - wireless channels
Keywords - wireless sensor networks
Keywords - wireless smart city
Keywords - Wyvern
Keywords - Zigbee
NCSU SoS Lablet: Projects - Smart Isolation in Large-Scale Production Computing Infrastructures
NCSU SoS Lablet: Projects - Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
SoS Documents: By Topic - NSA SoS Lablets Materials
SoS Documents: By Topic - UIUC
SoS Hard Problems - Policy-Governed Secure Collaboration
SoS Hard Problems - Resilient Architectures
SoS Hard Problems - Scalability and Composability
SoS Hard Problems - Security Metrics Driven Evaluation, Design, Development, and Deployment
SoS Hard Problems - Understanding and Accounting for Human Behavior
SoS Lablet Universities & Projects - CMU
SoS Lablet Universities & Projects - ICSI
SoS Lablet Universities & Projects - KU
SoS Lablet Universities & Projects - NCSU
SoS Lablet Universities & Projects - UIUC
SoS LR 3.0: Hard Problem - Human Behavior
SoS LR 3.0: Hard Problem - Metrics
SoS LR 3.0: Hard Problem - Policy-Governed Secure Collaboration
SoS LR 3.0: Hard Problem - Resilient Architectures
SoS LR 3.0: Hard Problem - Scalability and Composability
SoS LR 3.0: Lablet - CMU
SoS LR 3.0: Lablet - ICSI
SoS LR 3.0: Lablet - KU
SoS LR 3.0: Lablet - NCSU
SoS LR 3.0: Lablet - UIUC
SoS LR 3.0: Lablet - VU
SoS LR 3.0: Project - Analytics for Cyber-Physical System Cybersecurity
SoS LR 3.0: Project - Automated Synthesis Framework for Network Security and Resilience
SoS LR 3.0: Project - Cloud-Assisted IoT Systems Privacy
SoS LR 3.0: Project - Contextual Integrity for Computer Systems
SoS LR 3.0: Project - Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure
SoS LR 3.0: Project - Designing for Privacy
SoS LR 3.0: Project - Formal Approaches to the Ontology & Epistemology of Resilience
SoS LR 3.0: Project - Foundations of a CPS Resilience
SoS LR 3.0: Project - Governance for Big Data
SoS LR 3.0: Project - Mixed Initiative and Collaborative Learning in Adversarial Environments
SoS LR 3.0: Project - Model-Based Explanation For Human-in-the-Loop Security
SoS LR 3.0: Project - Monitoring, Fusion, and Response for Cyber Resilience
SoS LR 3.0: Project - Multi-model Test Bed for the Simulation-based Evaluation of Resilience
SoS LR 3.0: Project - Obsidian Language for Blockchain
SoS LR 3.0: Project - Operationalizing Contextual Data
SoS LR 3.0: Project - Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
SoS LR 3.0: Project - Principles of Secure BootStrapping for IoT
SoS LR 3.0: Project - Reasoning about Accidental and Malicious Misuse via Formal Methods
SoS LR 3.0: Project - Resilient Control of Cyber-Physical Systems with Distributed Learning
SoS LR 3.0: Project - Scalable Privacy Analysis
SoS LR 3.0: Project - Scalable Trust Semantics & Infrastructure
SoS LR 3.0: Project - Secure Native Binary Execution
SoS LR 3.0: Project - Securing Safety-Critical Machine Learning Algorithms
SoS LR 3.0: Project - Security Behavior Observatory
SoS LR 3.0: Project - Side-Channel Attack Resistance
SoS LR 3.0: Project - Uncertainty in Security Analysis
SoS LR 3.0: Quarter - 2018: July
SoS LR 3.0: Quarter - 2018: October
SoS LR 3.0: Quarter - 2019: April
SoS LR 3.0: Quarter - 2019: January
SoS LR 3.0: Quarter - 2019: July
SoS LR 3.0: Quarter - 2019: October
SoS LR 3.0: Quarter - 2020: April
SoS LR 3.0: Quarter - 2020: January
SoS LR 3.0: Quarter - 2020: July
SoS LR 3.0: Quarter - 2020: October
SoS LR 3.0: Quarter - 2021: April
SoS LR 3.0: Quarter - 2021: January
SoS LR 3.0: Quarter - 2021: July
SoS LR 3.0: Quarter - 2021: October
SoS LR 3.0: Quarter - 2022: April
SoS LR 3.0: Quarter - 2022: January
SoS LR 3.0: Quarter - 2022: October
SoS LR: Hard Problem - Human Behavior
SoS LR: Hard Problem - Metrics
SoS LR: Hard Problem - Policy-Governed Secure Collaboration
SoS LR: Hard Problem - Resilient Architectures
SoS LR: Hard Problem - Scalability and Composability
SoS LR: Lablet - CMU
SoS LR: Lablet - NCSU
SoS LR: Lablet - UMD
SoS LR: Project - A Language and Framework for Development of Secure Mobile Applications
SoS LR: Project - Attack Surface and Defense-in-Depth Metrics
SoS LR: Project - Automated Synthesis of Resilient Architectures
SoS LR: Project - CMU PROJECTS: (select all that apply)
SoS LR: Project - Empirical Models for Vulnerability Exploits
SoS LR: Project - Formal Specification and Analysis of Security-Critical Norms and Policies
SoS LR: Project - Highly Configurable Systems
SoS LR: Project - Privacy Incidents Database
SoS LR: Project - Race Vulnerability Study and Hybrid Race Detection
SoS LR: Project - Real-time Privacy Risk Evaluation and Enforcement
SoS LR: Project - Resilience Requirements, Design, and Testing
SoS LR: Project - Science of Secure Frameworks
SoS LR: Project - Secure Composition of Systems and Policies
SoS LR: Project - Smart Isolation in Large-Scale Production Computing Infrastructures
SoS LR: Project - SoS Lablet Research Methods, Community Development and Support
SoS LR: Project - UMD PROJECTS:
SoS LR: Project - Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
SoS LR: Project - USE: User Security Behavior
SoS LR: Project - Vulnerability and Resilience Prediction Models
SoS LR: Project - Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
SoS LR: Quarter - Apr'15
SoS LR: Quarter - Apr'16
SoS LR: Quarter - Apr'17
SoS LR: Quarter - August'17
SoS LR: Quarter - Jan'15
SoS LR: Quarter - Jan'16
SoS LR: Quarter - Jan'17
SoS LR: Quarter - July'14
SoS LR: Quarter - July'15
SoS LR: Quarter - July'16
SoS LR: Quarter - Oct'14
SoS LR: Quarter - Oct'15
SoS LR: Quarter - Oct'16
SoS LR: Quarter - October'17
Topics - Architectures
Topics - Consumer
Topics - CPS Domains
Topics - CPS Technologies
Topics - Foundations
Topics - Modeling
Topics - Platforms
Topics - Science of Security
Topics - Secure Control Systems
Topics - Simulation
UMD SoS Lablet: Projects - Empirical Models for Vulnerability Exploits
Submitted
In Press
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
: concurrency
#ifdef
#SAT
2018: July
2018: October
2019: April
2019: January
2019: July
2019: October
2020: April
2020: January
2020: July
2020: October
2021: April
2021: January
2021: July
2021: October
2022: April
2022: January
2022: October
34K35
49L12
5G mobile communication
5G mobile networks
93D21
A Human-Agent-Focused Approach to Security Modeling
A Language and Framework for Development of Secure Mobile Applications
a priori unknown environments
Abstracts
Access Control
access policies
Acoustics
active cyber defense
Adaptation models
Adaptive Autonomy
adaptive security
Adaptive software
Adaptive system; Uncertainty; Uncertainty awareness; Uncertainty reduction; Decision making
Adaptive systems
Address space randomization
advanced persistent threat
adversarial attacks
adversarial examples
Agency
Aggregates
AIOps
Air gaps
air-gapped computer
Algorithms
alias control
aliasing
always listening
Analysis
Analytic Hierarchy Process.
Analytical models
Analytics for Cyber-Physical System Cybersecurity
and empirical study
and Grounded Theory
android
Android application
Android applications
Android Malware Detection
Android permissions
Android platform
anomaly detection
anomaly detection systems
Ansible
anti-virus
app
App Reviews
app store
approximate bisimulation
Approximation algorithms
Apr'15
Apr'16
Apr'17
architectural design
architectural extraction
Architectures
Artificial Intelligence (cs.AI)
assets
attack graph
attack surface
Attack Surface and Defense-in-Depth Metrics
attacker
attacker model
attacks
attestation protocol manager
attestation protocols
auditing
August'17
authentication
authentication infrastructure
authorisation
authority
Authorization
Automata
automated planning
Automated Synthesis Framework for Network Security and Resilience
Automated Synthesis of Resilient Architectures
Automated Testing
automobiles
Autonomic computing
Autonomic Security
autonomous systems
Autonomous vehicles
autonomy
Bandwidth
battery-operated
Benchmark testing
biased efficiency metric
biconnected home network centrality
bidirectional type systems
bidirectional typechecking
Biological system modeling
Biomedical monitoring
BitJabber
Blochchain
block-based programming
blockchain
Bluetooth
Broadcast Authentication
Browsers
brute fact
bug
build automation tools
build automation tools; survey; practitioners
Build system; Autotools; Autoconf; Build analysis
Buildings
C Preprocessor
C preprocessor · cppstats · variability · configurable systems · open-source systems · industrial systems · software product lines
C. D. Broad
callgraph
capabilities
capability safety
Capacitors
card tap logs
Cascading Failures
case study
category
causation concept
Cellular networks
cellular radio
centerpoint
certificate
certificate services
certificate transparency
certification
certification authorities
CFG-represented malware programs
chef
circuit-level treatment
circuit-level verification
classes
classification
classifier
classroom courses
Clocks
cloud computing
cloud computing infrastructures
Cloud-Assisted IoT Systems Privacy
clustering
Clustering Decision tree learning
CMU
code metrics
Cognition
Cognitive science
Collaboration
collaboration platform
Collaborative Intrusion Detection Systems
collision avoidance
Color
Commitments
Communication networks
Communication system signaling
Community discovery
comparative evaluation
Comparative Sentences
Complexity theory
compliance
Component Compositions
Component-Based Software
composability
computational complexity
Computational modeling
computer aided instruction
Computer bugs
Computer crime
computer network management
Computer science
computer science education
computer security
Computer simulation
computing methodologies
Concurrency
concurrency faults
confidence-aware human motion predictions
Configurable Software
Configurable Systems
configuration as code
configuration complexity
configuration constraints
configuration options
configuration scripts
Consensus algorithm
consent
constraints
consumer
consumer expectations
container
Container Security
container vulnerability exploit detection
Containers
Context
Contextual Integrity
Contextual Integrity for Computer Systems
contracts
control flow graph
control flow graphs
control systems
Controllability
convergence
convolution
convolutional neural nets
coordinated analysis
Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure
corpus analysis; object-oriented metrics; points-to analysis; heap abstractions
correctness
counting
Couplings
courses of action
COVID-19; data sharing for the public good
CPP
CPS Domains
CPS Technologies
crashes
Credentials in repositories
critical equipment
critical infrastructure facilities
critical infrastructures
critically oriented design
crowdsourcing
Cryptoeconomics
cryptography
cyber physical systems
cyber resilience and security
cyber security
cyber threats
cyber-attack
cyber-physical system
cyber-physical system safety
Cyber-physical systems
Cyber-physical systems; analysis contracts; sensor; control
cyber-security
cyberattack
cybersecurity
Cybersecurity data sharing; risk perception; data usage; personal privacy
cybersecurity; attack surface
Cyberspace
Data analysis
data breaches
Data Exfiltration
data flow analysis
data flows
data integrity
Data Leakage Detection
data mining
data plane programs
Data processing
data provenance
Data Races
Data security
data space randomization
data usage
Data visualization
Databases
DBT system
decision making
decision-making
deep graph convolutional neural network
Deep Learning
defect
defense strategies
Degradation
demographic information
denial-of-service
dependencies
dependency
Dependency management
Design
design approaches
Design patterns
Design Research
design studio
Designing for Privacy
detailed electric distribution system
DevOps
Devops Configuration as code Configuration script Continuous deployment Infrastructure as code Software engineering Systematic mapping study
devsecops
Diagnosis
Digital audio broadcasting
digital communication
digital forensics
digital world
dimensionality reduction
Disruptive Changes
distributed computing
Distributed databases
Distributed Systems
distribution networks
diverse access technologies
diverse cloud monitors
diverse network technologies
diversity
diversity reception
DLP
Docker Images
domain adaptation
domain expertise
domainsensitivity
dominating sets
DRAM chips
DRAM clock
DRAM controller
dynamic analysis
dynamic anomaly detection scheme
Dynamic attack
Dynamic binary translation
Dynamic Binary Translation system
Dynamic Binary translators
dynamic game theory
dynamic vulnerability attack detection schemes
Dynamical Systems (math.DS)
ECDH
Ecosystem
edge networks
editorial
Education
educational courses
effective smart grid related characteristics
Electrical power system simulation
electricity market
Electricity supply industry
electromagnetic signals
electronic engineering
Electronic mail
EM
embedded Linux
emergence
emergent properties
empirical
Empirical Development of Patterns
empirical evaluation
Empirical Models for Vulnerability Exploits
Empirical studies of programmers
empirical studies of programming languages
empirical study
emulation
emulators
enterprise cloud administrators
Entitlements
environmental uncertainty
EPC
Epistemology
Estimation
ethereum
evidential reasoning
Evolving Software
experiment design
experimental platform-as-a-service cloud
Explainable Planning
explainable software
Exploratory Testing
extensibility
extensible languages
extensible syntax; macros; hygiene; type inference
face recognition
failure-prone circumstances
false data injection attack
feature extraction
Feature Interaction
federated learning
fine-grained policies
firewall
first-class classes
flow graphs
foreign function interfaces
Forensic logging
formal analysis
Formal Approaches to the Ontology & Epistemology of Resilience
formal methods
formal models
formal multidimensional multilayer
Formal Specification and Analysis of Security-Critical Norms and Policies
formal verification
FOS: Computer and information sciences
FOS: Electrical engineering
FOS: Mathematics
Foundations
Foundations of a CPS Resilience
fraud
fraudulent TLS server certificates
free
functional perspectives
fundamental metrics
fundamentality
Future Internet of Things (IoT)
future networks
Fuzzy logic
game theory
Games
gang scheduling
GDPR
General Data Protection Regulation
Generators
generic malware classification systems
geographic perspectives
Global Positioning System
Governance for Big Data
gradient methods
gradual typing
graph analysis
graph convolution
graph matching techniques
graph typology
grid resilience
GridLAB-D
groupware
Guidelines
Hamilton-Jacobi reachability
handcrafted features
handcrafted malware features
Handheld computers
Hardcoded secrets
Hardware
hardware accelerated cryptography module
hardware faults
Hardware-in-the-Loop
hedging
heterogeneous monitor data
heterogeneous protocols
heterogeneous technologies
Heuristic algorithms
hierarchical object graphs
high-level architecture
high-order system dynamics
Highly Configurable Systems
HIPAA
home automation
homotopy theory
host machine
HTTP Network Traffic
Human Behavior
human factors
human motion prediction
human movement
Human-in-the-Loop
human-robot interaction
human-robot interaction and collaboration
hygiene
hypernym
Hyponym
IBN
ICSI
Identity management
Identity provider
IdP-issued ticket
IDS
image processing
Immutability
Incident Response
Indexes
indoor location
information diffusion
information engineering
Information Flow Control
information sharing
infrastructure as code
initial algebras.
Input Generation
input sanitation
Input variables
insecure coding
instruction set randomization
Instruction sets
integrated circuits
intent provenance model
intent semantics
intent-based networking
intent-driven network application
Inter-App vulnerabilities
Interactive Explanation
interference control
Internet
Internet of Things
Internet of Things (IoT)
Internet security
Interviews
Intrusion detection
invasive software
IoT
IoT topology
Iterative methods
Jan'15
Jan'16
Jan'17
January 2020
Java sandbox
JIT
July'14
July'15
July'16
July'17
Just-in-Time
Kernel
kernel debugging
Kernels
Key Management
knowledge transfer
KU
language-based security
Laplace equations
Law
layered attestation
learning (artificial intelligence)
learning-based planner
Learning-enabled components; Prediction confidence; Conformal prediction
legitimate communication channels
Linear systems
linear types
linearity
link removals
Linux
Linux kernel
literature review
Load flow
load forecast
load forecasting
Load modeling
log analysis
log clustering
Logic gates
low-bit-rate services
machine learning
Machine Learning (cs.LG)
Machine Learning (stat.ML)
Magnetoacoustic effects
Malware
malware analysis methods
Malware Clas- sification
malware classification
malware detection
Malware propagation
Markov Decision Process Planning
Markov processes
massively open online courses
Mathematical model
MATLAB
Meaning
Measurement
mechanized metatheory
Mental model
metadata
Metamodeling
metamodels
metaphysical accounts
metaprogramming
Meters
metric data
Metrics
Micro-architecture
microarchitectural attacks
microgrid
Microsoft Windows
Microwave integrated circuits
mirrors
Mixed Initiative and Collaborative Learning in Adversarial Environments
Mobile app
Mobile Apps
mobile payment security
Mobile Permissions
mobile radio
mobile robots
mobile security
model checking
Model degradation
model-based design
Model-Based Explanation For Human-in-the-Loop Security
model-based graph clustering
Modeling
Modeling and Simulation
Models
modules
Monitoring, Fusion, and Response for Cyber Resilience
MOOC format
MOOCs
motion planning
movement scenarios
moving target defense
moving target defenses
Mozilla Firefox
multi-core machines
Multi-model Test Bed for the Simulation-based Evaluation of Resilience
multi-robot systems
multiagent systems
Multicore Processors
multidimensional multilayer network
multimodal interaction
multiprocessing systems
multirobot multihuman collision avoidance
multitask estimation
multithreading
Mutability
National Institute of Standards and Technology Interagency Report
natural language parsing
natural language processing
Navigation
NCSU
Net energy (NE)
NetLearner
netsblox
network analysis
network connectivity
network design principles
Network diagnostics
Network Emulation
network intrusion detection systems
network management
network operating system
network resilience
network robustness
network structure
network theory (graphs)
Network topology
Network Troubleshooting
network verification
network virtualization
network visibility
networked system
networked system control
networks
neural nets
Neural Network
Neural networks
Neurocosmetics
Neurons
NIDS
NISTIR 7628
node removals
node types
nominal and structural types
Non-Functional Requirements
nonadaptive graph matching techniques
nonSSO authentication services
Normative reasons
Norms
NSA SoS Lablets Materials
object graphs; ownership type inference; graph query
Object recognition
object-oriented
Object-oriented programming; frameworks; interoperability; service abstractions
objective function
objectives
objects
Observability
Obsidian Language for Blockchain
Oct'14
Oct'15
Oct'16
October'17
older adults
on-campus course
on-campus software security course
online learning
Ontology
operational environments
Operationalizing Contextual Data
Operationalizing Contextual Integrity
optical receivers
optimal control
Optimization
Organizations
ownership
ownership types
P4AIG
PaaS
Paging Procedure
paid
Pairwise connectivity
parallel
Parallel garbage collection; Work stealing
parallel processing
parallel programming
parallel tasks
parameter selection
parameter synthesis
parameterizable state automaton templates
parsing
Partial Models
Partitioning algorithms
password
passwords
path planning
pattern classification
Pattern matching
patterns
patterns security security requirements
pay for privacy
Payment Channels
Performance
Permission Models
permissions
Phasor Measurement Unit
phasor measurement unit (PMU)
phasor measurement units
philosophy of chemistry
phishing attacks
physical access logs
physical access system
Physical attack
physical constraints
physical covert channels
physical data sources
physical environment
Physical layer
physical obstacles
Pins
pipeline processing
Pipelines
Planning
Platforms
policy
policy evaluation
Policy-Governed Secure Collaboration
power engineering computing
power grid
power markets
Power measurement
power system
power system economics
power system observability
power system reliability
power system security
Power systems
Power systems; Adversarial attacks; Load forecasting; Dynamic data repair
power-grid security
power-grid security and resilience
Power-grid simulation
practitioners
precedence constraints
precise attack
Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
prediction
prediction models
Predictive models
Preferred Entities
preprocessors
principal component analysis
Principle of Sufficient Reason
Principles of Secure BootStrapping for IoT
privacy
privacy and security
Privacy as expectations
privacy attitudes; contextual integrity
privacy by design
privacy classification
Privacy Incidents Database
Privacy Policies
privacy policy
privacy principles
Privacy summary
proactive security reviews
Probabilistic logic
probabilistic model checking
probabilistic planning
Processes
program analysis
program binaries
program compilers
program debugging
program editors; type systems; live programming; program prediction
program interpreters
program translations parallelization
program verification
programmable data planes
Programmer productivity
Programming language design
programming language evaluation
Programming language usability
protocol
Protocols
PROV
PRovINTENT
Prudence
psychology
pubcrawl
Public key
public key cryptography
public key infrastructure
puppet
qualitative analysis
Qualitative research
qualitative studies
quality attributes
quantifier alternation
quiz scores
r-robustness
race conditions
Race Vulnerability Study and Hybrid Race Detection
radar detection
Rail transportation
railway infrastructure
railway signaling system
railway station
railway transportation system
railways
Random access memory
Random faults
random sampling
RASA
raw binary files
reachability analysis
Real-time
Real-time Privacy Risk Evaluation and Enforcement
Real-time Systems
reality concept
Reasoning about Accidental and Malicious Misuse via Formal Methods
reasoning about conflicts
recommender system
Redundancy
Refactoring
reflection
regression testing
regular expressions
Relational Logic
relationship
reliability
reliability models
rely-guarantee
relying party
remote attestation
requirements
requirements analysis
requirements engineering
requirements engineering; patterns; patternmining; abstraction
requirements validation
requirements; security; privacy; usability; literature survey
resilience
Resilience Requirements, Design, and Testing
Resiliency
resilient aggregation
Resilient Architectures
resilient consensus
Resilient Control of Cyber-Physical Systems with Distributed Learning
Resilient Cyberphysical Systems
Resilient diffusion
Resilient distributed learning and optimization
Resource management
reverse-engineering
risk
risk management
risk perception.
risk-based attack surface approximation
Robot kinematics
robot navigation
Robot sensing systems
robot vision
Robotics
Robotics (cs.RO)
robotics literature
robust control
robust control models
robust graphs
robust motion planning
robust network construction
Robustness
Root cause analysis
rowhammer
run-time
Runtime
runtime verification
safe autonomous navigation
Safety
safety analysis
safety critical
Safety Critical ML
safety-critical software
safety-critical systems
sampling
sampling error
Samuel Alexander
sanctions
Sandboxing
satisfiability
Scalability and Composability
Scalable Privacy Analysis
Scalable Trust Semantics & Infrastructure
scale-out
scenarios
Science of Secure Frameworks
science of security
scientific accounts
SDN
SDN control
SDN diagnostics tool
SDN network forensics
Secret detection tool
Secrets in repositories
Secure Composition of Systems and Policies
Secure Control Systems
Secure Cyberphysical Systems
Secure Native Binary Execution
Securing Safety-Critical Machine Learning Algorithms
security
security analysis
security and privacy risk
security and resilience
security assessment
security behavior
Security Behavior Observatory
Security behavior; measurement; user studies
Security decision-making patterns requirements analysis situation awareness
security designs
Security feature diagram patterns requirements
security metrics
Security Metrics Driven Evaluation, Design, Development, and Deployment
security models
security of data
security patching
security requirements
security requirements patterns
security services
security tools
security vulnerabilities
Security VulnerabilityMining Software RepositoriesSoftware Analysis
Security; Human Factors; Psychology; Analogical Transfer
security; non-interference; authorized declassi- fication; epistemic logic
security; requirements; patterns; analysis; decision-making; ysituation awareness
security; usable security; risk homeostasis theory; risk compensation
self-* properties
self-adaptation
Self-adaptation.
self-adaptive systems
Self-adaptive systems; Diagnostics; Monitoring
self-driving infrastructure
Self-protection
Self-Protection; Software Architecture; Software Security
semantic versioning
Semantics
sensitivity analysis
Sensors
sequence diagram
sequential circuit analysis
sequential circuits
sequential priority ordering
Servers
service infrastructure control
Session types; Linear logic; Process calculi; Strong normalization; Confluence; Logical relations; Observational equivalences
Shape
shared cache
shared memory systems
Side-channel attack
Side-Channel Attack Resistance
significant manual effort
simulation
simulation environments
simulation tools
single sign-on
single sign-on services
situation awareness
smart contract languages
smart contracts
smart environment
Smart grid
smart grid cyber security guidelines
Smart Grid Privacy
Smart grids
smart home
Smart homes
smart infrastructure
Smart Isolation in Large-Scale Production Computing Infrastructures
smart meters
smart power grids
smart-city environments
smart-grids
smart-home
smell
snap!
Social Engineering
social network analysis
social networking (online)
social norms
socio-technical factors
Sociology
sociotechnical systems
Software
software architecture
software architecture; architectural control; distributed systems; capabilities; layered architectures; alias control; domain specific languages
software composition analysis
software defined networking
Software Defined Networks
Software dependability
software development lifecycle
Software ecosystems
software ecosystems; notification feeds; information overload; transparent environments; anomaly detection
software engineering
software fault tolerance
Software patterns
software protection
software quality
software security coursework
software security material
Software Security Metrics
Software systems
Software Testing
software-defined networking
Software-defined networking (SDN)
SoS Lablet Research Methods, Community Development and Support
sparse networks
Special issues and sections
Spectre
SSO services
SSO ticket
Stack traces
Stackelberg Security Game
startup overhead
startup performance improvement
state
state estimation
state feedback
State Space Exploration
State Space Reduction
State Space Size Estimation
static analyses
static analysis
Static attack
static type checking
static verification
static vulnerability attack detection schemes
Statistical Model Checking
Steady-state
Stimulated emission
stochastic games
storage management
string sanitation
Structural health monitoring
structural robustness
structure editors
student motivations
supply chain security
surrogate models
survey
Surveys
survivability model
Switches
symbolic model checking
Synchronization
Syntactics
system behavior
systematic literature review
Systems and Control (eess.SY)
tags
tailgating
Task Analysis
Taxonomy
Taxonomy and Survey
teaching
technical information
technological interdependency
technology interdependence graph
technology-level perspectives
telecommunication control
telecommunication network reliability
telecommunication network topology
templates
temporal logic
temporal reasoning
test efforts
testbed
Testing
text mining
theoretical completeness
threat indicators
Time/Fidelity trade-offs
timed automata
TLS handshakes
TLS man-in-the-middle attacks
Tools
Topology
Tracking
Trade-Offs
Tradeoff analysis
traditional software verification techniques
Training
Training data
Trajectory
trajectory control
trajectory planning
transactive energy
transactive energy market
Transportation network
Trust
Trust management
trust model
trust-enhancements
Trusted Computing
trusted nodes
trusted third party
trustiness
Two dimensional displays
type declarations
type inference
type systems
Type theory
type-2
typestate
typestates
UIUC
UMD
unauthorized data transfer
unauthorized physical access
Uncertainty
Uncertainty in Security Analysis
uncertainty quantification
underlying network structure
Understanding and Accounting for Human Behavior
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
update criteria
usability of programming languages
usability; key fingerprints; authentication; secure messaging
usable security
USE: User Security Behavior
user study
user study; vignettes; scenarios; security requirements; requirements elicitation
user-centered design
user-centered programming language design
utility functions
Utility-privacy tradeoff
vagueness
value
Variability models
Variability-Aware Execution
Variational data structures
Vehicle dynamics
Vehicles
verification
vignettes
Violation Detection
Virtual machine monitors
virtual platforms
Virtual Time
virtualization
vision-based planner
visual programming
visualization
voice assistants
VU
vulnerabilities
Vulnerability
Vulnerability and Resilience Prediction Models
Vulnerability Propagation
W3C PROV-DM
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
web security
Weight measurement
Well-being
wireless channels
Wireless sensor networks
wireless smart city
Wyvern
Zigbee