Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» METRICS
Metrics
biblio
Some Vulnerabilities Are Different Than Others: Studying Vulnerabilities and Attack Surfaces in the Wild
Submitted by tdumitra on Fri, 01/09/2015 - 9:43pm
Empirical Models for Vulnerability Exploits
Metrics
Oct'14
UMD
Metrics
UMD
Empirical Models for Vulnerability Exploits
UMD PROJECTS:
Oct'14
Empirical Models for Vulnerability Exploits
biblio
SharkFin: Spatio-temporal mining of software adoption and penetration
Submitted by tdumitra on Fri, 01/09/2015 - 9:35pm
data analysis
Empirical Models for Vulnerability Exploits
Internet security
Jan'15
Malware propagation
Metrics
UMD
Metrics
UMD
Empirical Models for Vulnerability Exploits
UMD PROJECTS:
Jan'15
Empirical Models for Vulnerability Exploits
tearline
SoS Quarterly Summary Report - Oct to Dec 2014 - January 2015
Submitted by awhitesell on Fri, 01/09/2015 - 4:43pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UIUC
UIUC PROJECTS:
FY14-18
Jan'15
tearline
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems - January 2015
Submitted by awhitesell on Fri, 01/09/2015 - 2:26pm
Approved by NSA
Scalability and Composability
Metrics
UIUC
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
FY14-18
Jan'15
tearline
User-Centered Design for Security - UMD - January 2015
Submitted by jkatz on Fri, 01/09/2015 - 2:12pm
Approved by NSA
Metrics
Human Behavior
UMD
User-Centered Design for Security
FY14-18
Jan'15
tearline
Data Driven Security Models and Analysis - January 2015
Submitted by awhitesell on Fri, 01/09/2015 - 2:03pm
Approved by NSA
Metrics
Resilient Architectures
Human Behavior
UIUC
Data Driven Security Models and Analysis
FY14-18
Jan'15
tearline
SoS Quarterly Summary Report - UMD - January 2015
Submitted by jkatz on Fri, 01/09/2015 - 1:53pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UMD
Does the Presence of Honest Users Affect Intruders' Behavior
Empirical Models for Vulnerability Exploits
Human Behavior and Cyber Vulnerabilities
Reasoning about Protocols with Human Participants
Trust, Recommendation Systems, and Collaboration
Trustworthy and Composable Software Systems with Contracts
Understanding Developers' Reasoning about Privacy and Security
User-Centered Design for Security
Verification of Hyperproperties
FY14-18
Jan'15
tearline
A Hypothesis Testing Framework for Network Security - January 2015
Submitted by awhitesell on Fri, 01/09/2015 - 12:51pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
UIUC
A Hypothesis Testing Framework for Network Security
FY14-18
Jan'15
tearline
Science of Human Circumvention of Security - January 2015
Submitted by awhitesell on Fri, 01/09/2015 - 12:22pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Human Behavior
UIUC
Science of Human Circumvention of Security
FY14-18
Jan'15
tearline
Data-Driven Model-Based Decision-Making - January 2015
Submitted by awhitesell on Fri, 01/09/2015 - 12:03pm
Approved by NSA
Metrics
Human Behavior
UIUC
Data-Driven Model-Based Decision-Making
FY14-18
Jan'15
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »