Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» FY14-18
FY14-18
tearline
Resilience Requirements, Design, and Testing
Submitted by drwright on Mon, 12/08/2014 - 12:09pm
Approved by NSA
Metrics
Resilient Architectures
NCSU
Resilience Requirements, Design, and Testing
FY14-18
Jan'15
tearline
Scientific Understanding of Policy Complexity - January 2015
Submitted by drwright on Mon, 12/08/2014 - 12:07pm
Approved by NSA
Policy-Governed Secure Collaboration
Human Behavior
NCSU
Scientific Understanding of Policy Complexity
FY14-18
Jan'15
tearline
Formal Specification and Analysis of Security-Critical Norms and Policies - January 2015
Submitted by drwright on Mon, 12/08/2014 - 12:05pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
NCSU
Formal Specification and Analysis of Security-Critical Norms and Policies
FY14-18
Jan'15
tearline
Understanding Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems - January 2015
Submitted by drwright on Mon, 12/08/2014 - 12:03pm
Approved by NSA
Policy-Governed Secure Collaboration
Resilient Architectures
NCSU
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
FY14-18
Jan'15
tearline
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security - January 2015
Submitted by drwright on Mon, 12/08/2014 - 12:01pm
Approved by NSA
Human Behavior
NCSU
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
FY14-18
Jan'15
tearline
A Human Information-Processing Analysis of Online Deception Detection - January 2015
Submitted by drwright on Mon, 12/08/2014 - 11:59am
Approved by NSA
NCSU
A Human Information-Processing Analysis of Online Deception Detection
FY14-18
tearline
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators, and Reducing Vulnerability - January 2015
Submitted by drwright on Mon, 12/08/2014 - 11:56am
Approved by NSA
Human Behavior
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
Jan'15
tearline
Vulnerability and Resilience Prediction Models - January 2015
Submitted by drwright on Mon, 12/08/2014 - 11:49am
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
NCSU
Vulnerability and Resilience Prediction Models
FY14-18
Jan'15
tearline
Systematization of Knowledge from Intrusion Detection Models - January 2015
Submitted by drwright on Mon, 12/08/2014 - 11:47am
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
Human Behavior
NCSU
Systematization of Knowledge from Intrusion Detection Models
FY14-18
Jan'15
tearline
Redundancy for Network Intrusion Prevention Systems (NIPS) - January 2015
Submitted by drwright on Wed, 12/03/2014 - 12:57pm
Approved by NSA
Resilient Architectures
NCSU
Redundancy for Network Intrusion Prevention Systems (NIPS)
FY14-18
Jan'15
« first
‹ previous
…
41
42
43
44
45
46
47
48
49
…
next ›
last »