Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» APR'16
Apr'16
biblio
Evaluating Trade-offs of Human Involvement in Self-adaptive Systems
Submitted by Jamie Presken on Tue, 12/06/2016 - 11:23am
Adaptive Autonomy
Apr'16
CMU
human-in-the-loop
Self-Adaptation
Trade-Offs
CMU
Apr'16
tearline
SoS Lablet Annual Report - UMD
Submitted by Heather Lucas on Thu, 05/12/2016 - 3:57pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UMD
FY14-18
Apr'16
tearline
SoS Lablet Annual Report - April 2015 - April 2016
Submitted by awhitesell on Wed, 05/11/2016 - 3:29pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UIUC
A Hypothesis Testing Framework for Network Security
Data Driven Security Models and Analysis
Data-Driven Model-Based Decision-Making
Science of Human Circumvention of Security
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
FY14-18
Apr'16
tearline
SoS Lablet Annual Report - NCSU
Submitted by drwright on Wed, 05/04/2016 - 4:28am
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
A Human Information-Processing Analysis of Online Deception Detection
Attack Surface and Defense-in-Depth Metrics
Automated Synthesis of Resilient Architectures
Formal Specification and Analysis of Security-Critical Norms and Policies
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Privacy Incidents Database
Redundancy for Network Intrusion Prevention Systems (NIPS)
Resilience Requirements, Design, and Testing
Scientific Understanding of Policy Complexity
Smart Isolation in Large-Scale Production Computing Infrastructures
Systematization of Knowledge from Intrusion Detection Models
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Vulnerability and Resilience Prediction Models
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
Apr'16
biblio
A Model-based Approach to Anomaly Detection in Software Architectures
Submitted by Jamie Presken on Mon, 04/25/2016 - 11:54am
Anomaly Detection
Apr'16
CMU
model-based graph clustering
CMU
Apr'16
biblio
Abstract Runtime Structure Reasoning about Security
Submitted by Jamie Presken on Mon, 04/25/2016 - 11:19am
Apr'16
CMU
object graphs; ownership type inference; graph query
CMU
Apr'16
biblio
Mining Software Component Interactions to Detect Security Threats at the Architectural Level
Submitted by Jamie Presken on Mon, 04/25/2016 - 11:07am
Apr'16
CMU
Data mining
security
Software Architecture
CMU
Apr'16
biblio
Raindroid - A System for Run-time Mitigation of Android Intent Vulnerabilities
Submitted by Jamie Presken on Mon, 04/25/2016 - 10:59am
Apr'16
CMU
security
Self-Adaptation
Software Architecture
CMU
Apr'16
tearline
SoS Quarterly Summary Report - UMD - April 2016
Submitted by jkatz on Mon, 04/25/2016 - 10:51am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UMD
UMD PROJECTS:
FY14-18
Apr'16
biblio
A Theory and Tools for Applying Sandboxes Effectively
Submitted by Jamie Presken on Mon, 04/25/2016 - 10:49am
Apr'16
CMU
Java sandbox
sandboxing
software engineering
software protection
supply chain security
CMU
Apr'16
1
2
3
4
5
next ›
last »