Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
CPS-VO
»
Science of Security VO
»
Science of Security and Privacy: Lablet Program Management
» APPROVED BY NSA
Approved by NSA
tearline
Secure Native Binary Executions--July 2020 Q2
Submitted by prasadk on Wed, 07/08/2020 - 5:18am
Approved by NSA
Metrics
Scalability and Composability
KU
Secure Native Binary Execution
2020: July
tearline
CMU SoS Lablet Quarterly Executive Summary - July 2020
Submitted by Jamie Presken on Mon, 07/06/2020 - 9:44am
Approved by NSA
Human Behavior
Metrics
Policy-Governed Secure Collaboration
Resilient Architectures
Scalability and Composability
CMU
Security Behavior Observatory
Model-Based Explanation For Human-in-the-Loop Security
Obsidian Language for Blockchain
Securing Safety-Critical Machine Learning Algorithms
2020: July
tearline
Securing Safety-Critical Machine Learning Algorithms - July 2020
Submitted by Jamie Presken on Mon, 07/06/2020 - 9:43am
Approved by NSA
Metrics
Resilient Architectures
CMU
Securing Safety-Critical Machine Learning Algorithms
2020: July
tearline
Model-Based Explanation For Human-in-the-Loop Security - July 2020
Submitted by Jamie Presken on Mon, 07/06/2020 - 9:43am
Approved by NSA
Human Behavior
Metrics
Resilient Architectures
CMU
Model-Based Explanation For Human-in-the-Loop Security
2020: July
tearline
Obsidian: A Language for Secure-By-Construction Blockchain Programs - July 2020
Submitted by Jamie Presken on Mon, 07/06/2020 - 9:42am
Approved by NSA
Human Behavior
Policy-Governed Secure Collaboration
Resilient Architectures
Scalability and Composability
CMU
Obsidian Language for Blockchain
2020: July
tearline
Characterizing user behavior and anticipating its effects on computer security with a Security Behavior Observatory - July 2020
Submitted by Jamie Presken on Mon, 07/06/2020 - 9:42am
Approved by NSA
Human Behavior
CMU
Security Behavior Observatory
2020: July
tearline
NCSU SoS Lablet Quarterly Executive Summary
Submitted by najmeri on Tue, 06/23/2020 - 2:32pm
Approved by NSA
NCSU
Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure
Development of Methodology Guidelines for Security Research
Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
Principles of Secure BootStrapping for IoT
Reasoning about Accidental and Malicious Misuse via Formal Methods
2020: July
tearline
Development of Methodology Guidelines for Security Research
Submitted by najmeri on Tue, 06/23/2020 - 2:32pm
Approved by NSA
NCSU
Development of Methodology Guidelines for Security Research
2020: July
tearline
Reasoning about Accidental and Malicious Misuse via Formal Methods
Submitted by najmeri on Tue, 06/23/2020 - 2:32pm
Approved by NSA
Policy-Governed Secure Collaboration
NCSU
Reasoning about Accidental and Malicious Misuse via Formal Methods
2020: July
tearline
Principles of Secure BootStrapping for IoT
Submitted by najmeri on Tue, 06/23/2020 - 2:31pm
Approved by NSA
Policy-Governed Secure Collaboration
NCSU
Principles of Secure BootStrapping for IoT
2020: July
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »