Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
CPS-VO
»
Science of Security VO
»
Science of Security and Privacy: Lablet Program Management
» 2020: APRIL
2020: April
tearline
Policy Analytics for Cybersecurity of Cyber-Physical Systems: April 2020 (Y2, Q4)
Submitted by Nazli Choucri on Fri, 04/03/2020 - 3:49pm
Defense
Critical Infrastructure
Vanderbilt
Approved by NSA
Policy-Governed Secure Collaboration
VU
Analytics for Cyber-Physical System Cybersecurity
2020: April
tearline
NCSU SoS Lablet Quarterly Executive Summary
Submitted by najmeri on Tue, 03/24/2020 - 3:50pm
Approved by NSA
NCSU
Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure
Development of Methodology Guidelines for Security Research
Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
Principles of Secure BootStrapping for IoT
Reasoning about Accidental and Malicious Misuse via Formal Methods
2020: April
tearline
Development of Methodology Guidelines for Security Research
Submitted by najmeri on Tue, 03/24/2020 - 3:50pm
Approved by NSA
NCSU
Development of Methodology Guidelines for Security Research
2020: April
tearline
Reasoning about Accidental and Malicious Misuse via Formal Methods
Submitted by najmeri on Tue, 03/24/2020 - 3:50pm
Approved by NSA
Policy-Governed Secure Collaboration
NCSU
Reasoning about Accidental and Malicious Misuse via Formal Methods
2020: April
tearline
Principles of Secure BootStrapping for IoT
Submitted by najmeri on Tue, 03/24/2020 - 3:50pm
Approved by NSA
Policy-Governed Secure Collaboration
NCSU
Principles of Secure BootStrapping for IoT
2020: April
tearline
Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
Submitted by najmeri on Tue, 03/24/2020 - 3:50pm
Approved by NSA
Metrics
NCSU
Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities
2020: April
tearline
Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure
Submitted by najmeri on Tue, 03/24/2020 - 3:50pm
Approved by NSA
Resilient Architectures
NCSU
Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure
2020: April
tearline
Characterizing user behavior and anticipating its effects on computer security with a Security Behavior Observatory - April 2020
Submitted by Jamie Presken on Sun, 03/15/2020 - 5:17pm
Approved by NSA
Human Behavior
CMU
Security Behavior Observatory
2020: April
tearline
Obsidian: A Language for Secure-By-Construction Blockchain Programs - April 2020
Submitted by Jamie Presken on Sun, 03/15/2020 - 5:16pm
Approved by NSA
Human Behavior
Policy-Governed Secure Collaboration
Resilient Architectures
Scalability and Composability
CMU
Obsidian Language for Blockchain
2020: April
tearline
Model-Based Explanation For Human-in-the-Loop Security - April 2020
Submitted by Jamie Presken on Sun, 03/15/2020 - 5:15pm
Approved by NSA
Human Behavior
Metrics
Resilient Architectures
CMU
Model-Based Explanation For Human-in-the-Loop Security
2020: April
« first
‹ previous
1
2
3
4
next ›
last »