Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Science of Security VO
Home
Archive
About
Search
Calendar
Members
Contact Us
Forums
Files
CPS-VO
»
Science of Security VO
» ACM CCS
ACM CCS
biblio
Cybersecurity Dynamics
Submitted by shouhuai on Wed, 09/17/2014 - 6:31pm
Modeling
Science of Security
Validation and Verification
Foundations
Cybersecurity dynamics
foundations
modeling
Science of Security
Security analysis
security model
validation and verification
ACM CCS
Cyber Security
biblio
Emergent Behavior in Cybersecurity
Submitted by shouhuai on Wed, 09/17/2014 - 6:31pm
Science of Security
Foundations
ACM CCS
cyber security
Cybersecurity
Emergent Behavior
foundations
Human and Societal Aspects of Security and Privacy
Science of Security
Security Properties
ACM CCS
Cyber Security
Human and Societal Aspects of Security and Privacy
biblio
Proving Abstractions of Dynamical Systems Through Numerical Simulations
Submitted by mitras on Wed, 09/17/2014 - 6:31pm
Systems Engineering
Science of Security
Simulation
Validation and Verification
CPS Technologies
Foundations
abstraction
ACM CCS
adversary
CPS Technologies
Cryptography
cyberphysical systems
foundations
Mathematical Foundations of Cryptography
Science of Security
simulation
systems engineering
validation and verification
verification
ACM CCS
Cryptography
Mathematical Foundations of Cryptography
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
biblio
Analyzing an Adaptive Reputation Metric for Anonymity Systems
Submitted by Nikita Borisov on Wed, 09/17/2014 - 6:31pm
Concurrency and Timing
Resilient Systems
Science of Security
Foundations
ACM CCS
anonymity
concurrency and timing
Database and Storage Security
Formal Methods and Theory of Security
foundations
Information Accountability and Usage Control
PID controller
Reputation Model
Resilient Systems
Science of Security
Security Metrics
Tor Network
ACM CCS
Database and Storage Security
Information Accountability and Usage Control
Formal Methods and Theory of Security
Security Metrics
biblio
Characterizing the Power of Moving Target Defense via Cyber Epidemic Dynamics
Submitted by shouhuai on Wed, 09/17/2014 - 6:31pm
Quantitative Verification
Systems Engineering
Modeling
Science of Security
Validation and Verification
CPS Technologies
Foundations
ACM CCS
CPS Technologies
Cyber Epidemic Dynamics
Cybersecurity dynamics
epidemic threshold
foundations
modeling
moving target defense
moving-target defense
Quantitative Verification
Science of Security
security models
systems engineering
Systems Security
validation and verification
ACM CCS
Moving-Target Defense
Systems Security
biblio
Human Factors in Webserver Log File Analysis: A Controlled Experiment on Investigating Malicious Activity
Submitted by llayman on Wed, 09/17/2014 - 6:30pm
Quantitative Verification
Science of Security
Validation and Verification
Foundations
ACM CCS
foundations
Human and Societal Aspects of Security and Privacy
Human Factors
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
log files
Quantitative Verification
Science of Security
security
Social Aspects of Security and Privacy
validation and verification
ACM CCS
Intrusion Detection Systems
Social Aspects of Security and Privacy
Human and Societal Aspects of Security and Privacy
Intrusion/Anomaly Detection and Malware Mitigation
biblio
Phishing in International Waters: Exploring Cross-national Differences in Phishing Conceptualizations Between Chinese, Indian and American Samples
Submitted by emerson on Wed, 09/17/2014 - 6:30pm
Science of Security
Foundations
ACM CCS
China
cultural differences
foundations
Human and Societal Aspects of Security and Privacy
India
information privacy
Intrusion/Anomaly Detection and Malware Mitigation
nationality
online privacy
Phishing
Privacy Protections
Science of Security
Social Aspects of Security and Privacy
Social Engineering Attacks
susceptibility
ACM CCS
Information Privacy
Phishing
Privacy Protections
Social Aspects of Security and Privacy
Social Engineering Attacks
Human and Societal Aspects of Security and Privacy
Intrusion/Anomaly Detection and Malware Mitigation
biblio
Less is More?: Investigating the Role of Examples in Security Studies Using Analogical Transfer
Submitted by arao on Wed, 09/17/2014 - 6:30pm
Systems Engineering
ACM CCS
Analogical Transfer
CPS Technologies
cyber security
foundations
Human and Societal Aspects of Security and Privacy
Human Factors
psychology
Science of Security
security
Social Aspects of Security and Privacy
systems engineering
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
ACM CCS
Cyber Security
Social Aspects of Security and Privacy
Human and Societal Aspects of Security and Privacy
biblio
A New Approach to Modeling and Analyzing Security of Networked Systems
Submitted by shouhuai on Wed, 09/17/2014 - 6:30pm
Modeling
Resilient Systems
Science of Security
Foundations
foundations
modeling
Resilient Systems
Science of Security
Security analysis
Security Metrics
Security modeling
Software Security Metrics
ACM CCS
Cyber Security
Security Metrics
Software Security Metrics
biblio
Log Your CRUD: Design Principles for Software Logging Mechanisms
Submitted by Laurie Williams on Wed, 09/17/2014 - 6:30pm
CPS Domains
Medical Devices
Health Care
Science of Security
Foundations
electronic health record software
Software and Application Security
Science of Security
science
nonrepudiation
medical devices
logging mechanism
Healthcare
health care
foundations
accountability
Database and Storage Security
Database Activity Monitoring
cyber security
CPS Domains
case study
black-box testing
audit
ACM CCS
ACM CCS
Cyber Security
Database Activity Monitoring
Database and Storage Security
Software and Application Security
« first
‹ previous
1
2
3
4
next ›
last »