Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Apr'16
biblio
Abstract Runtime Structure Reasoning about Security
Submitted by Jamie Presken on Mon, 04/25/2016 - 12:19pm
Apr'16
CMU
object graphs; ownership type inference; graph query
CMU
Apr'16
biblio
Mining Software Component Interactions to Detect Security Threats at the Architectural Level
Submitted by Jamie Presken on Mon, 04/25/2016 - 12:07pm
Apr'16
CMU
Data mining
security
Software Architecture
CMU
Apr'16
biblio
Raindroid - A System for Run-time Mitigation of Android Intent Vulnerabilities
Submitted by Jamie Presken on Mon, 04/25/2016 - 11:59am
Apr'16
CMU
security
Self-Adaptation
Software Architecture
CMU
Apr'16
biblio
A Theory and Tools for Applying Sandboxes Effectively
Submitted by Jamie Presken on Mon, 04/25/2016 - 11:49am
Apr'16
CMU
Java sandbox
sandboxing
software engineering
software protection
supply chain security
CMU
Apr'16
biblio
Exploiting FIFO Scheduler to Improve Parallel Garbage Collection Performance.
Submitted by Jamie Presken on Mon, 04/25/2016 - 11:37am
Apr'16
CMU
July'16
CMU
July'16
biblio
Visualizing the variational callgraph of the Linux Kernel: An approach for reasoning about dependencies
Submitted by Jamie Presken on Mon, 04/25/2016 - 10:06am
#ifdef
Apr'16
callgraph
CMU
configuration complexity
dependencies
Linux kernel
visualization
vulnerabilities
CMU
Apr'16
biblio
Establishing a Baseline for Measuring Advancement in the Science of Security - an Analysis of the 2015 IEEE Security & Privacy Proceedings
Submitted by drwright on Mon, 04/11/2016 - 4:24pm
Privacy Incidents Database
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
Vulnerability and Resilience Prediction Models
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Systematization of Knowledge from Intrusion Detection Models
Smart Isolation in Large-Scale Production Computing Infrastructures
Scientific Understanding of Policy Complexity
Resilience Requirements, Design, and Testing
Redundancy for Network Intrusion Prevention Systems (NIPS)
A Human Information-Processing Analysis of Online Deception Detection
NCSU PROJECTS:(select all that apply)
NCSU
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Formal Specification and Analysis of Security-Critical Norms and Policies
Automated Synthesis of Resilient Architectures
Attack Surface and Defense-in-Depth Metrics
Apr'16
biblio
Tri-Modularization of Firewall Policies
Submitted by drwright on Mon, 04/11/2016 - 9:02am
Apr'16
NCSU
Policy-Governed Secure Collaboration
Scientific Understanding of Policy Complexity
biblio
Differences in trust between human and automated decision aids
Submitted by emerson on Sun, 04/10/2016 - 1:56pm
Apr'16
Human behavior
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
Human Behavior
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
Apr'16
biblio
In automation we trust: Identifying varying levels of trust in human and automated information sources
Submitted by emerson on Sun, 04/10/2016 - 1:52pm
Apr'16
Human behavior
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
Human Behavior
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
Apr'16
« first
‹ previous
1
2
3
next ›
last »