Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Science of Security VO
Home
Archive
About
Search
Calendar
Members
Contact Us
Forums
Files
CPS-VO
»
Science of Security VO
» UIUC
UIUC
file
AppContext Differentiating Malicious and Benighn Mobile App Behaviors Using Context
Submitted by amyclay on Tue, 11/17/2015 - 11:58am
Science of Security
malware detection
security-sensitive behavior
UIUC
Human and Societal Aspects of Security and Privacy
NSA SoS Lablets Materials
Science of Security
UIUC
Human and Societal Aspects of Security and Privacy
NSA SoS Lablets Materials
Science of Human Circumvention of Security
biblio
Gamifying Software Security Education and Training via Secure Coding Duels in Code Hunt
Submitted by amyclay on Tue, 11/17/2015 - 11:46am
Science of Security
NSA SoS Lablets Materials
Science of Security
UIUC
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security
file
Gamifying Softwre Security Education and Training via Secure Codeing Duels in Code Hunt Poster Abstract
Submitted by amyclay on Tue, 11/17/2015 - 11:46am
Science of Security
UIUC
NSA SoS Lablets Materials
Science of Security
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security
biblio
Mismorphism: A Semiotic Model of Computer Security Circumvention (poster abstract)
Submitted by amyclay on Tue, 11/17/2015 - 11:36am
Science of Security
Human and Societal Aspects of Security and Privacy
Science of Security
UIUC
UIUC
Human and Societal Aspects of Security and Privacy
Science of Human Circumvention of Security
file
Mismorphism: a Semiotic Model of Computer Security Circumvention Poster Abstract
Submitted by amyclay on Tue, 11/17/2015 - 11:36am
Science of Security
Human and Societal Aspects of Security and Privacy
Science of Security
UIUC
UIUC
Human and Societal Aspects of Security and Privacy
Science of Human Circumvention of Security
biblio
Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent Based Modeling
Submitted by amyclay on Mon, 11/16/2015 - 6:41pm
Science of Security
Human and Societal Aspects of Security and Privacy
Science of Security
UIUC
UIUC
Human and Societal Aspects of Security and Privacy
Science of Human Circumvention of Security
file
Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based Modeling
Submitted by amyclay on Mon, 11/16/2015 - 6:41pm
Science of Security
UIUC
Human and Societal Aspects of Security and Privacy
Science of Security
UIUC
Human and Societal Aspects of Security and Privacy
Science of Human Circumvention of Security
biblio
Mismorphism: A Semiotic Model of Computer Security Circumvention
Submitted by amyclay on Mon, 11/16/2015 - 6:35pm
Science of Security
Human and Societal Aspects of Security and Privacy
Science of Security
UIUC
UIUC
Human and Societal Aspects of Security and Privacy
Science of Human Circumvention of Security
file
Mismorphism: a Semiotic Model of Computer Security Circumvention
Submitted by amyclay on Mon, 11/16/2015 - 6:35pm
Science of Security
UIUC
Human and Societal Aspects of Security and Privacy
Science of Security
UIUC
Human and Societal Aspects of Security and Privacy
Science of Human Circumvention of Security
biblio
Dynamic VM Dependability Monitoring Using Hypervisor Probes
Submitted by amyclay on Mon, 11/16/2015 - 6:12pm
Science of Security
computer security
fault diagnosis
NSA SoS Lablets Materials
Platform virtualization
Reliability
Science of Security
UIUC
Virtual machine monitors
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
« first
‹ previous
…
33
34
35
36
37
38
39
40
41
next ›
last »