Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» JAN'17
Jan'17
biblio
A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software
Submitted by Jamie Presken on Mon, 01/09/2017 - 10:03am
Android platform
CMU
Jan'17
program analysis
security assessment
Taxonomy and Survey
CMU
Jan'17
biblio
Escaping AutoHell: a vision for automated analysis and migration of autotools build systems
Submitted by Jamie Presken on Mon, 01/09/2017 - 7:19am
Build system; Autotools; Autoconf; Build analysis
CMU
Jan'17
CMU
Jan'17
tearline
SoS Quarterly Summary Report - CMU - January 2017
Submitted by Jamie Presken on Wed, 12/14/2016 - 11:53am
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Epistemic Models for Security
Geo-Temporal Characterization of Security Threats
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Race Vulnerability Study and Hybrid Race Detection
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
FY14-18
Jan'17
tearline
USE: User Security Behavior (CMU/Berkeley/University of Pittsburgh Collaborative Proposal) - January 2017
Submitted by Jamie Presken on Wed, 12/14/2016 - 11:46am
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Epistemic Models for Security
Geo-Temporal Characterization of Security Threats
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Race Vulnerability Study and Hybrid Race Detection
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
FY14-18
Jan'17
tearline
Other Projects - January 2017
Submitted by drwright on Mon, 12/12/2016 - 3:10pm
NSA Program Manager
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
Support, and Other Projects
FY14-18
Jan'17
tearline
Smart Isolation in Large-Scale Production Computing Infrastructures - January 2017
Submitted by drwright on Mon, 12/12/2016 - 2:40pm
Smart Isolation in Large-Scale Production Computing Infrastructures
NSA Program Manager
Resilient Architectures
NCSU
Smart Isolation in Large-Scale Production Computing Infrastructures
FY14-18
Jan'17
tearline
Redundancy for Network Intrusion Prevention Systems (NIPS) - January 2017
Submitted by drwright on Mon, 12/12/2016 - 2:36pm
Redundancy for Network Intrusion Prevention Systems (NIPS)
NSA Program Manager
Resilient Architectures
NCSU
Redundancy for Network Intrusion Prevention Systems (NIPS)
FY14-18
Jan'17
tearline
Systematization of Knowledge from Intrusion Detection Models - January 2017
Submitted by drwright on Mon, 12/12/2016 - 2:26pm
Systematization of Knowledge from Intrusion Detection Models
NSA Program Manager
Scalability and Composability
Metrics
Resilient Architectures
Human Behavior
NCSU
Systematization of Knowledge from Intrusion Detection Models
FY14-18
Jan'17
tearline
Vulnerability and Resilience Prediction Models - January 2017
Submitted by drwright on Mon, 12/12/2016 - 2:23pm
Vulnerability and Resilience Prediction Models
NSA Program Manager
Scalability and Composability
Metrics
Resilient Architectures
NCSU
Vulnerability and Resilience Prediction Models
FY14-18
Jan'17
tearline
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators, and Reducing Vulnerability - January 2017
Submitted by drwright on Mon, 12/12/2016 - 2:20pm
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
NSA Program Manager
Human Behavior
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
Jan'17
« first
‹ previous
1
2
3
4
5
6
next ›
last »