Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» FY14-18
FY14-18
tearline
Resilience Requirements, Design, and Testing - April 2015
Submitted by drwright on Sun, 03/22/2015 - 1:21pm
Resilience Requirements, Design, and Testing
Approved by NSA
Metrics
Resilient Architectures
NCSU
Resilience Requirements, Design, and Testing
FY14-18
Apr'15
tearline
Scientific Understanding of Policy Complexity - April 2015
Submitted by drwright on Sun, 03/22/2015 - 1:20pm
Scientific Understanding of Policy Complexity
Approved by NSA
Policy-Governed Secure Collaboration
Human Behavior
NCSU
Scientific Understanding of Policy Complexity
FY14-18
Apr'15
tearline
Understanding Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems - April 2015
Submitted by drwright on Sun, 03/22/2015 - 1:19pm
Understanding Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Approved by NSA
Policy-Governed Secure Collaboration
Resilient Architectures
NCSU
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
FY14-18
Apr'15
tearline
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security - April 2015
Submitted by drwright on Sun, 03/22/2015 - 1:19pm
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Approved by NSA
Human Behavior
NCSU
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
FY14-18
Apr'15
tearline
A Human Information-Processing Analysis of Online Deception Detection - April 2015
Submitted by drwright on Sun, 03/22/2015 - 1:18pm
A Human Information-Processing Analysis of Online Deception Detection
Approved by NSA
NCSU
A Human Information-Processing Analysis of Online Deception Detection
FY14-18
tearline
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators, and Reducing Vulnerability - April 2015
Submitted by drwright on Sun, 03/22/2015 - 1:18pm
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Approved by NSA
Human Behavior
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
Apr'15
tearline
Vulnerability and Resilience Prediction Models - April 2015
Submitted by drwright on Sun, 03/22/2015 - 1:18pm
Vulnerability and Resilience Prediction Models
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
NCSU
Vulnerability and Resilience Prediction Models
FY14-18
Apr'15
tearline
Systematization of Knowledge from Intrusion Detection Models - April 2015
Submitted by drwright on Sun, 03/22/2015 - 1:15pm
Systematization of Knowledge from Intrusion Detection Models
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
Human Behavior
NCSU
Systematization of Knowledge from Intrusion Detection Models
FY14-18
Apr'15
tearline
Redundancy for Network Intrusion Prevention Systems (NIPS) - April 2015
Submitted by drwright on Sun, 03/22/2015 - 1:08pm
Redundancy for Network Intrusion Prevention Systems (NIPS)
Approved by NSA
Resilient Architectures
NCSU
Redundancy for Network Intrusion Prevention Systems (NIPS)
FY14-18
Apr'15
tearline
Highly Configurable Systems - April 2015
Submitted by Jamie Presken on Wed, 03/04/2015 - 8:40am
Approved by NSA
Scalability and Composability
CMU
Highly Configurable Systems
FY14-18
« first
‹ previous
…
37
38
39
40
41
42
43
44
45
…
next ›
last »