Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» FY14-18
FY14-18
tearline
User-Centered Design for Security - UMD - April 2016
Submitted by jkatz on Wed, 03/30/2016 - 1:59pm
Approved by NSA
Metrics
Human Behavior
UMD
User-Centered Design for Security
FY14-18
Apr'16
tearline
Reasoning about Protocols with Human Participants - UMD - April 2016
Submitted by jkatz on Wed, 03/30/2016 - 1:58pm
Approved by NSA
Human Behavior
UMD
Reasoning about Protocols with Human Participants
FY14-18
Apr'16
tearline
Human Behavior and Cyber Vulnerabilities - UMD - April 2016
Submitted by jkatz on Wed, 03/30/2016 - 1:57pm
Approved by NSA
Metrics
Human Behavior
UMD
Human Behavior and Cyber Vulnerabilities
FY14-18
Apr'16
tearline
Empirical Models for Vulnerability Exploits - UMD - April 2016
Submitted by jkatz on Wed, 03/30/2016 - 1:56pm
Approved by NSA
Metrics
UMD
Empirical Models for Vulnerability Exploits
FY14-18
Apr'16
tearline
Does the Presence of Honest Users Affect Intruders' Behavior? - UMD - April 2016
Submitted by jkatz on Wed, 03/30/2016 - 1:56pm
Approved by NSA
Human Behavior
UMD
Does the Presence of Honest Users Affect Intruders' Behavior
FY14-18
Apr'16
tearline
Understanding how Users Process Security Advice - UMD - April 2016
Submitted by jkatz on Wed, 03/30/2016 - 1:55pm
Approved by NSA
Human Behavior
UMD
Understanding How Users Process Security Advice
FY14-18
Apr'16
tearline
SoS Quarterly Summary Report - CMU - April 2016
Submitted by Jamie Presken on Thu, 03/17/2016 - 7:08am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Epistemic Models for Security
Geo-Temporal Characterization of Security Threats
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Race Vulnerability Study and Hybrid Race Detection
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
FY14-18
Apr'16
tearline
Highly Configurable Systems - April 2016
Submitted by Jamie Presken on Thu, 03/17/2016 - 7:06am
Approved by NSA
Scalability and Composability
CMU
Highly Configurable Systems
FY14-18
tearline
Geo-Temporal Characterization of Security Threats - April 2016
Submitted by Jamie Presken on Thu, 03/17/2016 - 7:05am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Human Behavior
CMU
Geo-Temporal Characterization of Security Threats
FY14-18
Apr'16
tearline
Usable Formal Methods for the Design and Composition of Security and Privacy Policies (CMU/UTSA Collaborative Proposal) - April 2016
Submitted by Jamie Presken on Thu, 03/17/2016 - 7:03am
Approved by NSA
CMU
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
FY14-18
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
…
next ›
last »