Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Science of Security
biblio
Feature Cross-Substitution in Adversarial Classification
Submitted by Katie Dey on Tue, 03/03/2015 - 7:34pm
Resilient Systems
foundations
Resilient Systems
Science of Security
SURE Project
biblio
Multi-Defender Security Games on Networks
Submitted by Katie Dey on Tue, 03/03/2015 - 5:14pm
Resilient Systems
SURE Project
foundations
Resilient Systems
Science of Security
biblio
Efficient Complete Coverage Through Heterogeneous Sensing Nodes
Submitted by Katie Dey on Tue, 03/03/2015 - 5:06pm
Resilient Systems
Ad hoc networks
Complete coverage
covering density
foundations
Manganese
Measurement
Monitoring
Resilient Monitoring and Control
Resilient Systems
Science of Security
sensing cost
sensors
Wireless communication
wireless sensor networks
SURE Project
biblio
Securing Industrial Control Systems with a Simulation-based Verification System
Submitted by awhitesell on Tue, 01/13/2015 - 12:36pm
Science of Security
network security
Science of Security
UIUC
UIUC
Network Security
A Hypothesis Testing Framework for Network Security
biblio
Towards Correct Network Virtualization
Submitted by awhitesell on Tue, 01/13/2015 - 12:19pm
Science of Security
network security
NSA SoS Lablets Materials
Science of Security
UIUC
UIUC
Network Security
NSA SoS Lablets Materials
A Hypothesis Testing Framework for Network Security
profile
Jian LIU
CPS Domains
CPS Technologies
Education
Research Program Overview
system security
web security
Science of Security
biblio
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns
Submitted by Katie Dey on Fri, 10/24/2014 - 12:52pm
Science of Security
Patterns
taxonomy
software reusability
Software
security patterns
security of data
security knowledge
security
Science of Security
requirements engineering pattern
requirements engineering
psychology
abstraction
patternmining
Pattern recognition
pattern experimentation
object-oriented methods
Natural languages
knowledge reuse
information security guidelines
formal verification
documentation
cognitive psychology
CMU
CMU
biblio
Rethinking Security Requirements in RE Research
Submitted by Katie Dey on Fri, 10/24/2014 - 12:52pm
Science of Security
CMU
Human behavior
literature survey
Metrics
privacy
Requirements
Science of Security
security
SoS Lablet
usability
CMU
biblio
Characterizations and boundaries of security requirements patterns
Submitted by Katie Dey on Fri, 10/24/2014 - 12:52pm
Science of Security
security
Unified modeling language
SoS Lablet
Software systems
software engineering
software development life cycle
Silicon
security requirements patterns
security requirements
security of data
security aspects
boundaries
Science of Security
Patterns
Metrics
Human behavior
Guidelines
defining format
Context
CMU
characterizations
CMU
biblio
Agent-based Modeling of User Circumvention of Security
Submitted by Katie Dey on Fri, 10/24/2014 - 12:51pm
Science of Security
Human and Societal Aspects of Security and Privacy
Human behavior
NSA SoS Lablets Materials
Science of Human Circumvention of Security
Science of Security
SoS Lablet
UIUC
UIUC
Human and Societal Aspects of Security and Privacy
NSA SoS Lablets Materials
Science of Human Circumvention of Security
« first
‹ previous
…
42
43
44
45
46
47
48
49
50
next ›
last »