Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» AUGUST'17
August'17
biblio
No (Privacy) News is Good News: An Analysis of New York Times and Guardian Privacy News from 2010 to 2016
Submitted by mpsingh on Mon, 10/09/2017 - 9:09am
August'17
NCSU
Policy-Governed Secure Collaboration
Privacy Incidents Database
Policy-Governed Secure Collaboration
NCSU
Privacy Incidents Database
August'17
tearline
SoS Lablet Annual Report - UMD
Submitted by jkatz on Mon, 09/25/2017 - 10:05am
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UMD
Does the Presence of Honest Users Affect Intruders' Behavior
Empirical Models for Vulnerability Exploits
Human Behavior and Cyber Vulnerabilities
Measuring and Improving Management of Today's PKI
Reasoning about Protocols with Human Participants
Trust, Recommendation Systems, and Collaboration
Trustworthy and Composable Software Systems with Contracts
Understanding Developers' Reasoning about Privacy and Security
Understanding How Users Process Security Advice
User-Centered Design for Security
Verification of Hyperproperties
FY14-18
August'17
tearline
SoS Lablet Annual Report - NCSU
Submitted by drwright on Wed, 09/06/2017 - 9:24am
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
A Human Information-Processing Analysis of Online Deception Detection
Attack Surface and Defense-in-Depth Metrics
Automated Synthesis of Resilient Architectures
Formal Specification and Analysis of Security-Critical Norms and Policies
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Privacy Incidents Database
Redundancy for Network Intrusion Prevention Systems (NIPS)
Resilience Requirements, Design, and Testing
Scientific Understanding of Policy Complexity
Smart Isolation in Large-Scale Production Computing Infrastructures
Systematization of Knowledge from Intrusion Detection Models
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Vulnerability and Resilience Prediction Models
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
August'17
biblio
Improved cyber threat indicator sharing by scoring privacy risk
Submitted by Jamie Presken on Tue, 08/01/2017 - 1:58pm
August'17
CMU
cyber security
information sharing
privacy
Real-time Privacy Risk Evaluation and Enforcement
Risk
threat indicators
CMU
Real-time Privacy Risk Evaluation and Enforcement
August'17
biblio
Software certification in practice: how are standards being applied?
Submitted by Jamie Presken on Wed, 07/12/2017 - 7:56am
August'17
CMU
Highly Configurable Systems
Scalability and Composability
Scalability and Composability
CMU
Highly Configurable Systems
August'17
biblio
Ensuring the Consistency of Adaptation through Inter- and Intra-Component Dependency Analysis
Submitted by Jamie Presken on Tue, 07/11/2017 - 2:43pm
Adaptive software
August'17
CMU
Component-Based Software
Scalability and Composability
Science of Secure Frameworks
update criteria
Scalability and Composability
CMU
Science of Secure Frameworks
August'17
biblio
A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software
Submitted by Jamie Presken on Tue, 07/11/2017 - 2:39pm
August'17
CMU
Scalability and Composability
Science of Secure Frameworks
Scalability and Composability
CMU
Science of Secure Frameworks
August'17
biblio
DELDroid: Determination and Enforcement of Least-Privilege Architecture in Android
Submitted by Jamie Presken on Tue, 07/11/2017 - 2:30pm
August'17
CMU
Scalability and Composability
Science of Secure Frameworks
Scalability and Composability
CMU
Science of Secure Frameworks
August'17
biblio
Can Unicorns Help Users Compare Crypto Key Fingerprints?
Submitted by Jamie Presken on Tue, 07/11/2017 - 2:17pm
August'17
CMU
Human behavior
usability; key fingerprints; authentication; secure messaging
USE: User Security Behavior
Human Behavior
CMU
USE: User Security Behavior
August'17
biblio
Replication: Challenges in Using Data Logs to Validate Phishing Detection Ability Metrics
Submitted by Jamie Presken on Tue, 07/11/2017 - 2:07pm
August'17
CMU
Human behavior
USE: User Security Behavior
Human Behavior
CMU
USE: User Security Behavior
August'17
1
2
3
4
5
next ›
last »