Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» METRICS
Metrics
tearline
Measuring and Improving Management of Today's PKI - UMD - October 2015
Submitted by dml on Fri, 10/16/2015 - 2:08pm
Science of Security
Project PI
Metrics
UMD
Measuring and Improving Management of Today's PKI
July'14
tearline
SoS Quarterly Summary Report - CMU - October 2015
Submitted by Jamie Presken on Wed, 10/14/2015 - 5:36am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Epistemic Models for Security
Geo-Temporal Characterization of Security Threats
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Race Vulnerability Study and Hybrid Race Detection
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
FY14-18
Oct'15
tearline
Measuring and Improving Management of Today's PKI - UMD - October 2015
Submitted by jkatz on Mon, 10/12/2015 - 10:23pm
Approved by NSA
Metrics
Human Behavior
UMD
Measuring and Improving Management of Today's PKI
FY14-18
Oct'15
tearline
User-Centered Design for Security - UMD - October 2015
Submitted by jkatz on Mon, 10/12/2015 - 10:21pm
Approved by NSA
Metrics
Human Behavior
UMD
User-Centered Design for Security
FY14-18
Oct'15
tearline
Human Behavior and Cyber Vulnerabilities - UMD - October 2015
Submitted by jkatz on Mon, 10/12/2015 - 10:19pm
Approved by NSA
Metrics
Human Behavior
UMD
Human Behavior and Cyber Vulnerabilities
FY14-18
Oct'15
tearline
Empirical Models for Vulnerability Exploits - UMD - October 2015
Submitted by jkatz on Mon, 10/12/2015 - 10:18pm
Approved by NSA
Metrics
UMD
Empirical Models for Vulnerability Exploits
FY14-18
Oct'15
biblio
Security Profile of Fedora
Submitted by vouk on Sun, 10/11/2015 - 12:20am
Metrics
NCSU
Resilience Requirements, Design, and Testing
Resilient Architectures
Scalability and Composability
Vulnerability and Resilience Prediction Models
Scalability and Composability
Metrics
Resilient Architectures
NCSU
Resilience Requirements, Design, and Testing
Vulnerability and Resilience Prediction Models
tearline
SoS Quarterly Summary Report July to September 2015 - October 2015
Submitted by awhitesell on Tue, 10/06/2015 - 11:12am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UIUC
A Hypothesis Testing Framework for Network Security
Data Driven Security Models and Analysis
Data-Driven Model-Based Decision-Making
Science of Human Circumvention of Security
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
FY14-18
Oct'15
tearline
Data-Driven Model-Based Decision-Making - Otober 2015
Submitted by awhitesell on Tue, 10/06/2015 - 11:09am
Approved by NSA
Metrics
Human Behavior
UIUC
Data-Driven Model-Based Decision-Making
FY14-18
Oct'15
tearline
A Hypothesis Testing Framework for Network Security - October 2015
Submitted by awhitesell on Tue, 10/06/2015 - 11:08am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
UIUC
A Hypothesis Testing Framework for Network Security
FY14-18
Oct'15
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »