Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» FY14-18
FY14-18
tearline
Scientific Understanding of Policy Complexity - April 2016
Submitted by drwright on Thu, 03/10/2016 - 11:17am
Scientific Understanding of Policy Complexity
Approved by NSA
Policy-Governed Secure Collaboration
Human Behavior
NCSU
Scientific Understanding of Policy Complexity
FY14-18
Apr'16
tearline
Understanding Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems - April 2016
Submitted by drwright on Thu, 03/10/2016 - 11:07am
Approved by NSA
Policy-Governed Secure Collaboration
Resilient Architectures
NCSU
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
FY14-18
Apr'16
tearline
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security - April 2016
Submitted by drwright on Thu, 03/10/2016 - 11:03am
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Approved by NSA
Human Behavior
NCSU
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
FY14-18
Apr'16
tearline
A Human Information-Processing Analysis of Online Deception Detection - April 2016
Submitted by drwright on Thu, 03/10/2016 - 11:01am
A Human Information-Processing Analysis of Online Deception Detection
Approved by NSA
NCSU
A Human Information-Processing Analysis of Online Deception Detection
FY14-18
tearline
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators, and Reducing Vulnerability - April 2016
Submitted by drwright on Thu, 03/10/2016 - 10:39am
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Approved by NSA
Human Behavior
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
Apr'16
tearline
Vulnerability and Resilience Prediction Models - April 2016
Submitted by drwright on Thu, 03/10/2016 - 10:35am
Vulnerability and Resilience Prediction Models
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
NCSU
Vulnerability and Resilience Prediction Models
FY14-18
Apr'16
tearline
Systematization of Knowledge from Intrusion Detection Models - April 2016
Submitted by drwright on Thu, 03/10/2016 - 10:32am
Systematization of Knowledge from Intrusion Detection Models
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
Human Behavior
NCSU
Systematization of Knowledge from Intrusion Detection Models
FY14-18
Apr'16
tearline
Redundancy for Network Intrusion Prevention Systems (NIPS) - April 2016
Submitted by drwright on Thu, 03/10/2016 - 10:26am
Redundancy for Network Intrusion Prevention Systems (NIPS)
Approved by NSA
Resilient Architectures
NCSU
Redundancy for Network Intrusion Prevention Systems (NIPS)
FY14-18
Apr'16
tearline
SoS Quarterly Summary Report - NCSU - April 2016
Submitted by drwright on Thu, 03/10/2016 - 10:23am
Round 2 Projects
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
A Human Information-Processing Analysis of Online Deception Detection
Attack Surface and Defense-in-Depth Metrics
Automated Synthesis of Resilient Architectures
Formal Specification and Analysis of Security-Critical Norms and Policies
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Redundancy for Network Intrusion Prevention Systems (NIPS)
Resilience Requirements, Design, and Testing
Scientific Understanding of Policy Complexity
Smart Isolation in Large-Scale Production Computing Infrastructures
Systematization of Knowledge from Intrusion Detection Models
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Vulnerability and Resilience Prediction Models
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
Apr'16
tearline
Smart Isolation in Large-Scale Production Computing Infrastructures - April 2016
Submitted by drwright on Thu, 03/10/2016 - 10:17am
Smart Isolation in Large-Scale Production Computing Infrastructures
Approved by NSA
Resilient Architectures
NCSU
Smart Isolation in Large-Scale Production Computing Infrastructures
FY14-18
Apr'16
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »