Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Rethinking Security Requirements in RE Research
Submitted by Katie Dey on Fri, 10/24/2014 - 11:52am
Science of Security
CMU
Human behavior
literature survey
Metrics
privacy
Requirements
Science of Security
security
SoS Lablet
usability
CMU
biblio
Characterizations and boundaries of security requirements patterns
Submitted by Katie Dey on Fri, 10/24/2014 - 11:52am
Science of Security
security
Unified modeling language
SoS Lablet
Software systems
software engineering
software development life cycle
Silicon
security requirements patterns
security requirements
security of data
security aspects
boundaries
Science of Security
Patterns
Metrics
Human behavior
Guidelines
defining format
Context
CMU
characterizations
CMU
biblio
Security Through Extensible Type Systems
Submitted by Katie Dey on Fri, 10/24/2014 - 11:51am
Science of Security
A Language and Framework for Development of Secure Mobile Applications
extensibility
Human behavior
Scalability and Composability
security
SoS Lablet
A Language and Framework for Development of Secure Mobile Applications
CMU
biblio
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation
Submitted by rvmeush on Fri, 09/26/2014 - 12:04pm
audio
Automatic testing
captchas
Demography
Friction
Humans
image
Large-scale systems
mechanical turk
Mechanical variables measurement
privacy
security
Speech
Statistics
biblio
Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
Computational modeling
covert channels
Lattices
Processor scheduling
secret information
secure information flow
security
security of data
Semantics
Sensitivity
timing
biblio
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
Mobile Security
Web browser
survey
Smartphones
smart phones
security of data
security
operating systems
nuts
bolts
mobile network security
mobile devices
mobile computing
Mobile communication
Internet society
internet
Computers
biblio
Third-Party Web Tracking: Policy and Technology
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
security
Web sites
Web privacy
Web pages
Web innovation
user browsing activity tracking
third-party Web tracking
third-party Web sites
third-party tracking
social networking
advertising
privacy
History
fourth party Web measurement platform
Economics
Do Not Track
data privacy
Companies
analytics
biblio
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
privacy
Web sites
Web site identification
Web pages
Vectors
upstream bandwidth
traffic morphing scheme
traffic analysis countermeasures
traffic analysis attack
TLS
telecommunication traffic
TA attack
Support vector machines
SSH
security
Accuracy
padding
machine learning
IPsec
hypermedia
HTTP traffic
general-purpose TA countermeasures
encryption
encrypted tunnel
encrypted traffic
downstream bandwidth
Cryptography
Bandwidth
attack/countermeasure pairings
biblio
The Psychology of Security for the Home Computer User
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
Phishing
usability and security
Software
security interventions
security decisions
security breaches
security
risky behavior
privacy
Computational modeling
home users
home computer user
Electronic mail
Educational institutions
Computers
computer security
Computer crime
biblio
Rethinking SSL Development in an Appified World
Submitted by Heather Lucas on Wed, 09/17/2014 - 5:46pm
security
mitma
ios
apps
android
SSL
« first
‹ previous
…
435
436
437
438
439
440
441
442
443
…
next ›
last »