Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
»
2014
HotSoS 2014
file
Integration of Security Pattern Selection Practices with Pattern Storage (poster)
Submitted by Heather Lucas on Wed, 06/04/2014 - 9:43am. Contributors:
Jean-Michel Lehker
Rocky Slavin
Jianwei Niu
Slides of this poster are available
here
.
Experimentation
Management
Patterns
Repository
HotSoS 2014
Academia
Poster
Posters
Posters
Security Requirements
file
Improving Mobile Application Security via Bridging User Expectations and Application Behaviors (poster)
Submitted by taoxie on Wed, 06/04/2014 - 9:43am. Contributors:
Wei Yang
Xusheng Xiao
Rahul Pandita
William Enck
Tao Xie
Slides of this poster are available
here
.
natural language processing
Privacy Control
HotSoS 2014
Academia
Poster
Posters
Posters
Usable Privacy
Usable Security
file
Examining Reliability of Wireless Multihop Networks with Linear Systems (poster)
Submitted by rudra on Wed, 06/04/2014 - 9:43am. Contributors:
Trisha Biswas
Kendra Lesser
Rudra Dutta
Meeko Oishi
Slides of this poster are available
here
.
Performance
Routing
stochastic dynamical systems
wireless multihop network
HotSoS 2014
Academia
Poster
Posters
Posters
file
Diversity Based Detection of Security Anomalies (poster)
Submitted by vouk on Wed, 06/04/2014 - 9:43am. Contributors:
Roopak Venkatakrishnan
Mladen A. Vouk
Slides of the poster are available
here
.
diversity
NVP
security anomaly
HotSoS 2014
Academia
Poster
Posters
Posters
Intrusion/Anomaly Detection and Malware Mitigation
file
Emergent Behavior in Cybersecurity (poster)
Submitted by shouhuai on Wed, 06/04/2014 - 9:43am. Contributor:
Shouhuai Xu
Emergent Behavior
HotSoS 2014
Academia
Poster
Posters
Posters
Cyber Security
file
Evidence-Based Trust Reasoning (poster)
Submitted by David Nicol on Wed, 06/04/2014 - 9:43am. Contributors:
Jingwei Huang
David M. Nicol
Slides of this poster are available
here
.
Belief Network
cloud
Evidence-based trust
privacy
HotSoS 2014
Academia
Poster
Posters
Posters
file
Channel Correlation Modeling for Link Signature Security Assessment (poster)
Submitted by Huaiyu on Wed, 06/04/2014 - 9:43am. Contributors:
Xiaofan He
Huaiyu Dai
Wenbo Shen
Peng Ning
HotSoS 2014
Academia
Poster
Posters
Posters
file
Cybersecurity Dynamics (poster)
Submitted by shouhuai on Wed, 06/04/2014 - 9:43am. Contributor:
Shouhuai Xu
Cybersecurity dynamics
Security analysis
security model
HotSoS 2014
Academia
Poster
Posters
Posters
file
Building the Security Behavior Observatory: An Infrastructure for Long-term Monitoring of Client Machines (poster)
Submitted by Acquisti Alessandro on Wed, 06/04/2014 - 9:43am. Contributors:
Alain Forget
Saranga Komanduri
Alessandro Acquisti
Nicolas Christin
Lorrie Faith Cranor
Rahul Telang
Slides of the poster are available
here
.
Data collection
field study
observation
server
users
HotSoS 2014
Academia
Poster
Posters
Posters
file
An Analysis of Fedora Security Profile (poster)
Submitted by Laurie Williams on Wed, 06/04/2014 - 9:43am. Contributors:
Shweta Subramani
Mladen A. Vouk
Laurie A. Williams
Slides of the poster are available
here
.
Aleatoric
Attack Profile
epistemic
Non-Operational Testing
HotSoS 2014
Academia
Poster
Posters
Posters
« first
‹ previous
1
2
3
4
5
6
next ›
last »