Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
CPS-VO
»
Science of Security VO
»
Science of Security and Privacy: Lablet Program Management
» NCSU
NCSU
biblio
Analyzing the Attack Landscape of Zigbee-Enabled IoT Systems and Reinstating Users' Privacy
Submitted by willirn1 on Fri, 10/23/2020 - 11:45am
attacks
ECDH
formal analysis
IoT
key management
NCSU
Policy-Governed Secure Collaboration
Principles of Secure BootStrapping for IoT
privacy
Zigbee
Policy-Governed Secure Collaboration
NCSU
Principles of Secure BootStrapping for IoT
2020: July
tearline
Development of Methodology Guidelines for Security Research
Submitted by najmeri on Tue, 09/15/2020 - 12:51pm
Approved by NSA
NCSU
Development of Methodology Guidelines for Security Research
2020: October
tearline
Reasoning about Accidental and Malicious Misuse via Formal Methods
Submitted by najmeri on Tue, 09/15/2020 - 12:51pm
Approved by NSA
Policy-Governed Secure Collaboration
NCSU
Reasoning about Accidental and Malicious Misuse via Formal Methods
2020: October
tearline
Principles of Secure BootStrapping for IoT
Submitted by najmeri on Tue, 09/15/2020 - 12:51pm
Approved by NSA
Policy-Governed Secure Collaboration
NCSU
Principles of Secure BootStrapping for IoT
2020: October
tearline
Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
Submitted by najmeri on Tue, 09/15/2020 - 12:51pm
Approved by NSA
Metrics
NCSU
Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
2020: October
tearline
Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure
Submitted by najmeri on Tue, 09/15/2020 - 12:51pm
Approved by NSA
Resilient Architectures
NCSU
Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure
2020: October
tearline
NCSU SoS Lablet Quarterly Executive Summary
Submitted by najmeri on Tue, 09/15/2020 - 12:50pm
Approved by NSA
NCSU
Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure
Development of Methodology Guidelines for Security Research
Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
Principles of Secure BootStrapping for IoT
Reasoning about Accidental and Malicious Misuse via Formal Methods
2020: October
tearline
NCSU SoS Lablet Quarterly Executive Summary
Submitted by najmeri on Tue, 06/23/2020 - 3:32pm
Approved by NSA
NCSU
Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure
Development of Methodology Guidelines for Security Research
Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
Principles of Secure BootStrapping for IoT
Reasoning about Accidental and Malicious Misuse via Formal Methods
2020: July
tearline
Development of Methodology Guidelines for Security Research
Submitted by najmeri on Tue, 06/23/2020 - 3:32pm
Approved by NSA
NCSU
Development of Methodology Guidelines for Security Research
2020: July
tearline
Reasoning about Accidental and Malicious Misuse via Formal Methods
Submitted by najmeri on Tue, 06/23/2020 - 3:32pm
Approved by NSA
Policy-Governed Secure Collaboration
NCSU
Reasoning about Accidental and Malicious Misuse via Formal Methods
2020: July
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »