Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» FY14-18
FY14-18
tearline
Attack Surface and Defense-in-Depth Metrics - October 2016
Submitted by drwright on Wed, 09/14/2016 - 9:50am
NSA Program Manager
Scalability and Composability
Metrics
Resilient Architectures
NCSU
Attack Surface and Defense-in-Depth Metrics
FY14-18
Oct'16
tearline
Systematization of Knowledge from Intrusion Detection Models - October 2016
Submitted by drwright on Wed, 09/14/2016 - 9:48am
Systematization of Knowledge from Intrusion Detection Models
NSA Program Manager
Scalability and Composability
Metrics
Resilient Architectures
Human Behavior
NCSU
Systematization of Knowledge from Intrusion Detection Models
FY14-18
Oct'16
tearline
Vulnerability and Resilience Prediction Models - October 2016
Submitted by drwright on Wed, 09/14/2016 - 9:46am
Vulnerability and Resilience Prediction Models
NSA Program Manager
Scalability and Composability
Metrics
Resilient Architectures
NCSU
Vulnerability and Resilience Prediction Models
FY14-18
Oct'16
tearline
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators, and Reducing Vulnerability - October 2016
Submitted by drwright on Wed, 09/14/2016 - 9:44am
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
NSA Program Manager
Human Behavior
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
Oct'16
tearline
A Human Information-Processing Analysis of Online Deception Detection - October 2016
Submitted by drwright on Wed, 09/14/2016 - 9:42am
A Human Information-Processing Analysis of Online Deception Detection
Approved by NSA
NCSU
A Human Information-Processing Analysis of Online Deception Detection
FY14-18
tearline
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security - October 2016
Submitted by drwright on Wed, 09/14/2016 - 9:39am
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
NSA Program Manager
Human Behavior
NCSU
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
FY14-18
Oct'16
tearline
Understanding Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems - October 2016
Submitted by drwright on Wed, 09/14/2016 - 8:35am
NSA Program Manager
Human Behavior
NCSU
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
FY14-18
Oct'16
tearline
Formal Specification and Analysis of Security-Critical Norms and Policies - October 2016
Submitted by drwright on Wed, 09/14/2016 - 8:29am
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
NCSU
Formal Specification and Analysis of Security-Critical Norms and Policies
FY14-18
Oct'16
tearline
Scientific Understanding of Policy Complexity - October 2016
Submitted by drwright on Wed, 09/14/2016 - 8:27am
Scientific Understanding of Policy Complexity
NSA Program Manager
Policy-Governed Secure Collaboration
Human Behavior
NCSU
Scientific Understanding of Policy Complexity
FY14-18
Oct'16
tearline
Resilience Requirements, Design, and Testing - October 2016
Submitted by drwright on Wed, 09/14/2016 - 8:25am
Resilience Requirements, Design, and Testing
NSA Program Manager
Metrics
Resilient Architectures
NCSU
Resilience Requirements, Design, and Testing
FY14-18
Oct'16
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »