Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
CPS-VO
»
Science of Security VO
»
Science of Security and Privacy: Lablet Program Management
» APPROVED BY NSA
Approved by NSA
tearline
Reasoning about Accidental and Malicious Misuse via Formal Methods
Submitted by Katie Dey on Tue, 04/09/2019 - 3:55pm
Approved by NSA
Policy-Governed Secure Collaboration
NCSU
Reasoning about Accidental and Malicious Misuse via Formal Methods
2019: April
tearline
Multi-model Testbed for the Simulation-based Evaluation of Resilience
Submitted by volgy on Tue, 04/09/2019 - 1:54pm
Architectures
Automotive
Multi-models
Modeling
Resilient Systems
Simulation
Approved by NSA
Metrics
Resilient Architectures
VU
Multi-model Test Bed for the Simulation-based Evaluation of Resilience
2019: April
tearline
Automated Synthesis Framework for Network Security and Resilience - April 2019
Submitted by awhitesell on Fri, 04/05/2019 - 6:34pm
Approved by NSA
Metrics
Policy-Governed Secure Collaboration
Resilient Architectures
Scalability and Composability
UIUC
Automated Synthesis Framework for Network Security and Resilience
2019: April
tearline
Uncertainty in Security Analysis - April 2019
Submitted by awhitesell on Fri, 04/05/2019 - 6:19pm
Approved by NSA
Metrics
Resilient Architectures
UIUC
Uncertainty in Security Analysis
2019: January
tearline
Monitoring, Fusion, and Response for Cyber Resilience - April 2019
Submitted by awhitesell on Fri, 04/05/2019 - 5:56pm
Approved by NSA
Policy-Governed Secure Collaboration
Resilient Architectures
UIUC
Monitoring, Fusion, and Response for Cyber Resilience
2019: April
tearline
NCSU SoS Lablet Quarterly Executive Summary
Submitted by najmeri on Wed, 03/20/2019 - 4:58pm
Approved by NSA
NCSU
Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure
Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
Principles of Secure BootStrapping for IoT
2019: April
tearline
Principles of Secure BootStrapping for IoT
Submitted by najmeri on Wed, 03/20/2019 - 4:56pm
Approved by NSA
Policy-Governed Secure Collaboration
NCSU
Principles of Secure BootStrapping for IoT
2019: April
tearline
Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
Submitted by najmeri on Wed, 03/20/2019 - 4:54pm
Approved by NSA
Metrics
NCSU
Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
2019: April
tearline
Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure
Submitted by najmeri on Wed, 03/20/2019 - 4:52pm
Approved by NSA
Resilient Architectures
NCSU
Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure
2019: April
tearline
Characterizing user behavior and anticipating its effects on computer security with a Security Behavior Observatory - April 2019
Submitted by Lorrie Cranor on Mon, 03/11/2019 - 3:24pm
Approved by NSA
Human Behavior
CMU
Security Behavior Observatory
2019: April
« first
‹ previous
…
31
32
33
34
35
36
37
38
39
…
next ›
last »