Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» FY14-18
FY14-18
tearline
Resilience Requirements, Design, and Testing - January 2016
Submitted by drwright on Tue, 12/01/2015 - 3:14pm
Resilience Requirements, Design, and Testing
Approved by NSA
Metrics
Resilient Architectures
NCSU
Resilience Requirements, Design, and Testing
FY14-18
Jan'16
tearline
Scientific Understanding of Policy Complexity - January 2016
Submitted by drwright on Tue, 12/01/2015 - 3:11pm
Scientific Understanding of Policy Complexity
Approved by NSA
Policy-Governed Secure Collaboration
Human Behavior
NCSU
Scientific Understanding of Policy Complexity
FY14-18
Jan'16
tearline
Formal Specification and Analysis of Security-Critical Norms and Policies - January 2016
Submitted by drwright on Tue, 12/01/2015 - 3:09pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
NCSU
Formal Specification and Analysis of Security-Critical Norms and Policies
FY14-18
Jan'16
tearline
Understanding Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems - January 2016
Submitted by drwright on Tue, 12/01/2015 - 3:07pm
Approved by NSA
Policy-Governed Secure Collaboration
Resilient Architectures
NCSU
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
FY14-18
Jan'16
tearline
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security - January 2016
Submitted by drwright on Tue, 12/01/2015 - 3:05pm
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Approved by NSA
Human Behavior
NCSU
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
FY14-18
Jan'16
tearline
A Human Information-Processing Analysis of Online Deception Detection - January 2016
Submitted by drwright on Tue, 12/01/2015 - 3:02pm
A Human Information-Processing Analysis of Online Deception Detection
Approved by NSA
NCSU
A Human Information-Processing Analysis of Online Deception Detection
FY14-18
tearline
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators, and Reducing Vulnerability - January 2016
Submitted by drwright on Tue, 12/01/2015 - 3:00pm
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Approved by NSA
Human Behavior
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
Jan'16
tearline
Vulnerability and Resilience Prediction Models - January 2016
Submitted by drwright on Tue, 12/01/2015 - 2:22pm
Vulnerability and Resilience Prediction Models
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
NCSU
Vulnerability and Resilience Prediction Models
FY14-18
Jan'16
tearline
Systematization of Knowledge from Intrusion Detection Models - January 2016
Submitted by drwright on Tue, 12/01/2015 - 2:20pm
Systematization of Knowledge from Intrusion Detection Models
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
Human Behavior
NCSU
Systematization of Knowledge from Intrusion Detection Models
FY14-18
Jan'16
tearline
Redundancy for Network Intrusion Prevention Systems (NIPS) - January 2016
Submitted by drwright on Tue, 12/01/2015 - 2:13pm
Redundancy for Network Intrusion Prevention Systems (NIPS)
Approved by NSA
Resilient Architectures
NCSU
Redundancy for Network Intrusion Prevention Systems (NIPS)
FY14-18
Jan'16
« first
‹ previous
…
25
26
27
28
29
30
31
32
33
…
next ›
last »