Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
»
2014
HotSoS 2014
file
American and Indian Conceptualization of Phishing (poster)
Submitted by emerson on Wed, 06/04/2014 - 9:43am. Contributors:
Rucha Tembe
Christopher M. Kelley
Christopher B. Mayhorn
Emerson Murphy-Hill
Kyung Wha Hong
Xi Ge
HotSoS 2014
Academia
Poster
Posters
Posters
Phishing
file
Access Control Policy Evolution: An Empirical Study (poster)
Submitted by Laurie Williams on Wed, 06/04/2014 - 9:43am. Contributors:
JeeHyun Hwang
Laurie A. Williams
Mladen A. Vouk
Slides of the poster are available
here
.
Evolution
HotSoS 2014
Academia
Poster
Posters
Posters
Access Control
file
Human Factors in Webserver Log File Analysis: A Controlled Experiment on Investigating Malicious Activity
Submitted by Heather Lucas on Tue, 06/03/2014 - 6:05pm. Contributors:
Lucas Layman
Sylvain David Diffo
Nico Zazworka
Forensics
Human Factors
investigation
log
visualization
HotSoS 2014
Industry
Presentations
Presentation Slides
Human and Societal Aspects of Security and Privacy
file
Understanding the 'H' in Science of Security HCI Research: Methods and Lessons Learned from Investigations of Phishing
Submitted by cmayhorn on Tue, 06/03/2014 - 5:35pm. Contributor:
Christopher B. Mayhorn, PhD
Human behavior
research methodology
HotSoS 2014
Academia
Presentations
Presentation Slides
Phishing
Human and Societal Aspects of Security and Privacy
file
Proving Abstractions of Dynamical Systems Using Numerical Simulations
Submitted by mitras on Tue, 06/03/2014 - 5:35pm. Contributor:
Sayan Mitra
Simulation
abstraction
security
HotSoS 2014
Academia
Presentations
Presentation Slides
file
Phishing In International Waters
Submitted by emerson on Tue, 06/03/2014 - 5:35pm. Contributors:
Emerson Murphy-Hill
Chris Mayhorn
Rucha Tembe
Olga Zielinska
Yuqi Liu
Kyung Wha Hong
Xi Ge
China
cultural differences
India
nationality
online privacy
susceptibility
HotSoS 2014
Academia
Presentations
Presentation Slides
Phishing
file
Log Your CRUD: Design Principles for Software Logging Mechanisms
Submitted by Laurie Williams on Tue, 06/03/2014 - 5:35pm. Contributors:
Jason King
Laurie Williams
audit
black-box evaluation
electronic health record
logging
nonrepudiaiton
user accountability
HotSoS 2014
Academia
Presentations
Presentation Slides
file
Open vs. Closed Systems for Accountability
Submitted by adj on Tue, 06/03/2014 - 5:35pm. Contributors:
Joan Feigenbaum
Aaron D. Jaggard
Rebecca N. Wright
accountability
anonymity
identity
open systems
utility theory
HotSoS 2014
Academia
Presentations
Presentation Slides
file
In-Nimbo Sandboxing
Submitted by scherlis on Tue, 06/03/2014 - 5:35pm. Contributors:
Michael Maass
William L. Scherlis
Jonathan Aldrich
Cloud Computing
pdf security
sandboxing
structured evaluation
HotSoS 2014
Academia
Presentations
Presentation Slides
file
Limiting Recertification in Highly Configurable Systems (slides)
Submitted by Heather Lucas on Tue, 06/03/2014 - 5:35pm. Contributors:
Christian Kästner
Jürgen Pfeffer
Certification
configuration options
network analysis
HotSoS 2014
Academia
Poster Slides
Presentation Slides
Security Metrics
Network Security
Security Certification
« first
‹ previous
1
2
3
4
5
6
next ›
last »