Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
UIUC
biblio
AppContext: Differentiating Malicious and Benign Mobile App Behavior Under Context
Submitted by amyclay on Tue, 11/17/2015 - 11:58am
Science of Security
Human and Societal Aspects of Security and Privacy
malware detection
NSA SoS Lablets Materials
Science of Security
security-sensitive behavior
UIUC
UIUC
Human and Societal Aspects of Security and Privacy
NSA SoS Lablets Materials
Science of Human Circumvention of Security
file
AppContext Differentiating Malicious and Benighn Mobile App Behaviors Using Context
Submitted by amyclay on Tue, 11/17/2015 - 11:58am
Science of Security
malware detection
security-sensitive behavior
UIUC
Human and Societal Aspects of Security and Privacy
NSA SoS Lablets Materials
Science of Security
UIUC
Human and Societal Aspects of Security and Privacy
NSA SoS Lablets Materials
Science of Human Circumvention of Security
biblio
Gamifying Software Security Education and Training via Secure Coding Duels in Code Hunt
Submitted by amyclay on Tue, 11/17/2015 - 11:46am
Science of Security
NSA SoS Lablets Materials
Science of Security
UIUC
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security
file
Gamifying Softwre Security Education and Training via Secure Codeing Duels in Code Hunt Poster Abstract
Submitted by amyclay on Tue, 11/17/2015 - 11:46am
Science of Security
UIUC
NSA SoS Lablets Materials
Science of Security
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security
biblio
Mismorphism: A Semiotic Model of Computer Security Circumvention (poster abstract)
Submitted by amyclay on Tue, 11/17/2015 - 11:36am
Science of Security
Human and Societal Aspects of Security and Privacy
Science of Security
UIUC
UIUC
Human and Societal Aspects of Security and Privacy
Science of Human Circumvention of Security
file
Mismorphism: a Semiotic Model of Computer Security Circumvention Poster Abstract
Submitted by amyclay on Tue, 11/17/2015 - 11:36am
Science of Security
Human and Societal Aspects of Security and Privacy
Science of Security
UIUC
UIUC
Human and Societal Aspects of Security and Privacy
Science of Human Circumvention of Security
biblio
Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent Based Modeling
Submitted by amyclay on Mon, 11/16/2015 - 6:41pm
Science of Security
Human and Societal Aspects of Security and Privacy
Science of Security
UIUC
UIUC
Human and Societal Aspects of Security and Privacy
Science of Human Circumvention of Security
file
Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based Modeling
Submitted by amyclay on Mon, 11/16/2015 - 6:41pm
Science of Security
UIUC
Human and Societal Aspects of Security and Privacy
Science of Security
UIUC
Human and Societal Aspects of Security and Privacy
Science of Human Circumvention of Security
biblio
Mismorphism: A Semiotic Model of Computer Security Circumvention
Submitted by amyclay on Mon, 11/16/2015 - 6:35pm
Science of Security
Human and Societal Aspects of Security and Privacy
Science of Security
UIUC
UIUC
Human and Societal Aspects of Security and Privacy
Science of Human Circumvention of Security
file
Mismorphism: a Semiotic Model of Computer Security Circumvention
Submitted by amyclay on Mon, 11/16/2015 - 6:35pm
Science of Security
UIUC
Human and Societal Aspects of Security and Privacy
Science of Security
UIUC
Human and Societal Aspects of Security and Privacy
Science of Human Circumvention of Security
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
next ›
last »