Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Science of Security VO
Home
Archive
About
Search
Calendar
Members
Contact Us
Forums
Files
CPS-VO
»
Science of Security VO
» UIUC
UIUC
file
A Lightweight Container-based Virtual Time System for Software-defined Network Emulation
Submitted by awhitesell on Fri, 01/20/2017 - 4:24pm
Science of Security
Linux kernel
Network Emulation
Science of Security
software-defined networking
Virtual Time
UIUC
NSA SoS Lablets Materials
A Hypothesis Testing Framework for Network Security
biblio
A Lightweight Container-based Virtual Time System for Software-defined Network Emulation
Submitted by awhitesell on Fri, 01/20/2017 - 4:22pm
Science of Security
Linux kernel
Network Emulation
Science of Security
software-defined networking
Virtual Time
UIUC
NSA SoS Lablets Materials
A Hypothesis Testing Framework for Network Security
file
Circumvention of Security: Good Users Do Bad Things
Submitted by awhitesell on Fri, 12/16/2016 - 2:51pm
Science of Security
Access controls
authentication
computer security
Human Factors
NSA SoS Lablets Materials
Science of Human Circumvention of Security
Science of Security
UIUC
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security
biblio
Circumvention of Security: Good Users Do Bad Things
Submitted by awhitesell on Fri, 12/16/2016 - 2:51pm
Science of Security
Access controls
authentication
computer security
Human Factors
NSA SoS Lablets Materials
Science of Human Circumvention of Security
Science of Security
UIUC
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security
file
Agent-Based Modeling of User Circumvention of Security
Submitted by awhitesell on Fri, 12/16/2016 - 2:42pm
Science of Security
Human and Societal Aspects of Security and Privacy
Human behavior
NSA SoS Lablets Materials
Science of Human Circumvention of Security
Science of Security
SoS Lablet
UIUC
UIUC
Human and Societal Aspects of Security and Privacy
NSA SoS Lablets Materials
Science of Human Circumvention of Security
file
Quasi-static Manipulation of a Kirechhoff Elastic Rod Based on Geometric Analysis of Equilibrium Configurations
Submitted by awhitesell on Thu, 12/15/2016 - 3:27pm
Science of Security
design and control
manipulation
manipulation planning
mechanics
NSA SoS Lablets Materials
path planning for manipulators
Science of Security
Theoretical Foundations of Threat Assessment by Inverse Optimal Control
UIUC
UIUC
NSA SoS Lablets Materials
Theoretical Foundations of Threat Assessment by Inverse Optimal Control
biblio
Quasi-Static Manipulation of a Kirchhoff Elastic Road Based on Geometric Analysis of Equilibrium Configurations
Submitted by awhitesell on Thu, 12/15/2016 - 3:27pm
Science of Security
design and control
manipulation
manipulation planning
mechanics
NSA SoS Lablets Materials
path planning for manipulators
Science of Security
Theoretical Foundations of Threat Assessment by Inverse Optimal Control
UIUC
UIUC
NSA SoS Lablets Materials
Theoretical Foundations of Threat Assessment by Inverse Optimal Control
biblio
Equilibrium Configurations of a Kirchhoff Elastic Rod under Quasi-static Manipulation
Submitted by awhitesell on Thu, 12/15/2016 - 3:14pm
Science of Security
Science of Security
UIUC
NSA SoS Lablets Materials
Theoretical Foundations of Threat Assessment by Inverse Optimal Control
file
Mechanics and Quasi-Static Manipulation of Planar Elastic Kinematic Chains
Submitted by awhitesell on Thu, 12/15/2016 - 3:02pm
Science of Security
deformable objects
manipulation
NSA SoS Lablets Materials
optimal control
planning motion and path planning
Science of Security
Theoretical Foundations of Threat Assessment by Inverse Optimal Control
UIUC
UIUC
NSA SoS Lablets Materials
Theoretical Foundations of Threat Assessment by Inverse Optimal Control
biblio
Mechanics and Quasi-Static Manipulation of Planar Elastic Kinematic Chains
Submitted by awhitesell on Thu, 12/15/2016 - 3:02pm
Science of Security
deformable objects
manipulation
NSA SoS Lablets Materials
optimal control
planning motion and path planning
Science of Security
Theoretical Foundations of Threat Assessment by Inverse Optimal Control
UIUC
UIUC
NSA SoS Lablets Materials
Theoretical Foundations of Threat Assessment by Inverse Optimal Control
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »