Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» AUGUST'17
August'17
tearline
Data Driven Security Models and Analysis - July 2017
Submitted by awhitesell on Fri, 07/07/2017 - 12:10pm
NSA Program Manager
Metrics
Resilient Architectures
Human Behavior
UIUC
Data Driven Security Models and Analysis
FY14-18
August'17
tearline
A Hypothesis Testing Framework for Network Security - July 2017
Submitted by awhitesell on Fri, 07/07/2017 - 11:43am
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
UIUC
A Hypothesis Testing Framework for Network Security
FY14-18
August'17
tearline
Science of Human Circumvention - July 2017
Submitted by awhitesell on Fri, 07/07/2017 - 11:27am
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
UIUC
Science of Human Circumvention of Security
FY14-18
August'17
tearline
Data-Driven Model-Based Decision-Making - July 2017
Submitted by awhitesell on Fri, 07/07/2017 - 9:34am
NSA Program Manager
Metrics
Human Behavior
UIUC
Data-Driven Model-Based Decision-Making
FY14-18
August'17
biblio
Characterizing Scientific Reporting in Security Literature: An Analysis of ACM CCS and IEEE S&P Papers
Submitted by JeffCarver on Thu, 07/06/2017 - 2:22pm
July'17
Literature Review
NCSU
Science of Security
SoS Lablet Research Methods, Community Development and Support
NCSU
SoS Lablet Research Methods, Community Development and Support
August'17
biblio
The {Internet} of {Things} and Multiagent Systems: Decentralized Intelligence in Distributed Computing
Submitted by mpsingh on Fri, 06/23/2017 - 3:44pm
Formal Specification and Analysis of Security-Critical Norms and Policies
July'17
NCSU
Policy-Governed Secure Collaboration
Policy-Governed Secure Collaboration
NCSU
Formal Specification and Analysis of Security-Critical Norms and Policies
August'17
biblio
Tosca: Operationalizing Commitments Over Information Protocols
Submitted by mpsingh on Fri, 06/23/2017 - 3:36pm
Formal Specification and Analysis of Security-Critical Norms and Policies
July'17
NCSU
Policy-Governed Secure Collaboration
Policy-Governed Secure Collaboration
NCSU
Formal Specification and Analysis of Security-Critical Norms and Policies
August'17
tearline
SoS Quarterly Summary Report - CMU - July 2017
Submitted by Jamie Presken on Mon, 06/12/2017 - 9:23am
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Epistemic Models for Security
Geo-Temporal Characterization of Security Threats
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Race Vulnerability Study and Hybrid Race Detection
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
FY14-18
August'17
tearline
Security Reasoning for Distributed Systems with Uncertainty (CMU/Cornell Collaborative Proposal) - July 2017
Submitted by Jamie Presken on Mon, 06/12/2017 - 9:22am
NSA Program Manager
Scalability and Composability
CMU
Security Reasoning for Distributed Systems with Uncertainty
FY14-18
August'17
tearline
USE: User Security Behavior (CMU/Berkeley/University of Pittsburgh Collaborative Proposal) - July 2017
Submitted by Jamie Presken on Mon, 06/12/2017 - 9:17am
Approved by NSA
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Epistemic Models for Security
Geo-Temporal Characterization of Security Threats
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Race Vulnerability Study and Hybrid Race Detection
Real-time Privacy Risk Evaluation and Enforcement
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
August'17
« first
‹ previous
1
2
3
4
5
next ›
last »