Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» FY14-18
FY14-18
tearline
Human Behavior and Cyber Vulnerabilities - UMD - July 2016
Submitted by jkatz on Mon, 06/27/2016 - 6:27pm
Approved by NSA
Metrics
Human Behavior
UMD
Human Behavior and Cyber Vulnerabilities
FY14-18
July'16
tearline
Empirical Models for Vulnerability Exploits - UMD - July 2016
Submitted by jkatz on Mon, 06/27/2016 - 6:26pm
Approved by NSA
Metrics
UMD
Empirical Models for Vulnerability Exploits
FY14-18
July'16
tearline
Does the Presence of Honest Users Affect Intruders' Behavior? - UMD - July 2016
Submitted by jkatz on Mon, 06/27/2016 - 6:25pm
Approved by NSA
Human Behavior
UMD
Does the Presence of Honest Users Affect Intruders' Behavior
FY14-18
July'16
tearline
Understanding how Users Process Security Advice - UMD - July 2016
Submitted by jkatz on Mon, 06/27/2016 - 6:25pm
Approved by NSA
Human Behavior
UMD
Understanding How Users Process Security Advice
FY14-18
July'16
tearline
Security Reasoning for Distributed Systems with Uncertainty (CMU/Cornell Collaborative Proposal) - July 2016
Submitted by Jamie Presken on Wed, 06/15/2016 - 9:59am
Approved by NSA
Scalability and Composability
Resilient Architectures
CMU
Security Reasoning for Distributed Systems with Uncertainty
FY14-18
tearline
Highly Configurable Systems - July 2016
Submitted by Jamie Presken on Wed, 06/15/2016 - 9:58am
Approved by NSA
Scalability and Composability
CMU
Highly Configurable Systems
FY14-18
tearline
Secure Composition of Systems and Policies - July 2016
Submitted by Jamie Presken on Wed, 06/15/2016 - 9:53am
Approved by NSA
Scalability and Composability
CMU
Secure Composition of Systems and Policies
FY14-18
tearline
USE: User Security Behavior (CMU/Berkeley/University of Pittsburgh Collaborative Proposal) - July 2016
Submitted by Jamie Presken on Wed, 06/15/2016 - 9:52am
Approved by NSA
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
FY14-18
July'16
tearline
Usable Formal Methods for the Design and Composition of Security and Privacy Policies (CMU/UTSA Collaborative Proposal) - July 2016
Submitted by Jamie Presken on Wed, 06/15/2016 - 9:50am
Approved by NSA
CMU
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
FY14-18
tearline
A Language and Framework for Development of Secure Mobile Applications - July 2016
Submitted by Jamie Presken on Wed, 06/15/2016 - 9:49am
Approved by NSA
Scalability and Composability
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
FY14-18
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »