Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Science of Security VO
Home
Archive
About
Search
Calendar
Members
Contact Us
Forums
Files
CPS-VO
»
Science of Security VO
» PRESENTATION SLIDES
Presentation Slides
file
Before We Knew It: An Empirical Study of Zero-Day Attacks in the Real World
Submitted by Heather Lucas on Tue, 06/10/2014 - 2:01pm. Contributor:
Tudor Dumitras
HotSoS 2014
Academia
Presentations
Presentation Slides
file
Human Factors in Webserver Log File Analysis: A Controlled Experiment on Investigating Malicious Activity
Submitted by Heather Lucas on Tue, 06/03/2014 - 6:05pm. Contributors:
Lucas Layman
Sylvain David Diffo
Nico Zazworka
Forensics
Human Factors
investigation
log
visualization
HotSoS 2014
Industry
Presentations
Presentation Slides
Human and Societal Aspects of Security and Privacy
file
Understanding the 'H' in Science of Security HCI Research: Methods and Lessons Learned from Investigations of Phishing
Submitted by cmayhorn on Tue, 06/03/2014 - 5:35pm. Contributor:
Christopher B. Mayhorn, PhD
Human behavior
research methodology
HotSoS 2014
Academia
Presentations
Presentation Slides
Phishing
Human and Societal Aspects of Security and Privacy
file
Proving Abstractions of Dynamical Systems Using Numerical Simulations
Submitted by mitras on Tue, 06/03/2014 - 5:35pm. Contributor:
Sayan Mitra
Simulation
abstraction
security
HotSoS 2014
Academia
Presentations
Presentation Slides
file
Phishing In International Waters
Submitted by emerson on Tue, 06/03/2014 - 5:35pm. Contributors:
Emerson Murphy-Hill
Chris Mayhorn
Rucha Tembe
Olga Zielinska
Yuqi Liu
Kyung Wha Hong
Xi Ge
China
cultural differences
India
nationality
online privacy
susceptibility
HotSoS 2014
Academia
Presentations
Presentation Slides
Phishing
file
Log Your CRUD: Design Principles for Software Logging Mechanisms
Submitted by Laurie Williams on Tue, 06/03/2014 - 5:35pm. Contributors:
Jason King
Laurie Williams
audit
black-box evaluation
electronic health record
logging
nonrepudiaiton
user accountability
HotSoS 2014
Academia
Presentations
Presentation Slides
file
Open vs. Closed Systems for Accountability
Submitted by adj on Tue, 06/03/2014 - 5:35pm. Contributors:
Joan Feigenbaum
Aaron D. Jaggard
Rebecca N. Wright
accountability
anonymity
identity
open systems
utility theory
HotSoS 2014
Academia
Presentations
Presentation Slides
file
In-Nimbo Sandboxing
Submitted by scherlis on Tue, 06/03/2014 - 5:35pm. Contributors:
Michael Maass
William L. Scherlis
Jonathan Aldrich
Cloud Computing
pdf security
sandboxing
structured evaluation
HotSoS 2014
Academia
Presentations
Presentation Slides
file
Limiting Recertification in Highly Configurable Systems (slides)
Submitted by Heather Lucas on Tue, 06/03/2014 - 5:35pm. Contributors:
Christian Kästner
Jürgen Pfeffer
Certification
configuration options
network analysis
HotSoS 2014
Academia
Poster Slides
Presentation Slides
Security Metrics
Network Security
Security Certification
file
Less is More? Investigating the Role of Examples in Security Studies using Analogical Transfer
Submitted by Heather Lucas on Tue, 06/03/2014 - 5:35pm. Contributors:
Ashwini Rao
Hanan Hibshi
Travis Breaux
Jean-Michel Lehker
Jianwei Niu
Analogical Transfer
Examples
Security Studies
User experiments
HotSoS 2014
Academia
Presentations
Presentation Slides
1
2
3
next ›
last »