Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» METRICS
Metrics
tearline
Attack Surface and Defense-in-Depth Metrics - April 2017
Submitted by drwright on Mon, 03/20/2017 - 7:16pm
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
NCSU
Attack Surface and Defense-in-Depth Metrics
tearline
Systematization of Knowledge from Intrusion Detection Models - April 2017
Submitted by drwright on Mon, 03/20/2017 - 7:16pm
Systematization of Knowledge from Intrusion Detection Models
NSA Program Manager
Scalability and Composability
Metrics
Resilient Architectures
Human Behavior
NCSU
Systematization of Knowledge from Intrusion Detection Models
FY14-18
Apr'17
tearline
Vulnerability and Resilience Prediction Models - April 2017
Submitted by drwright on Mon, 03/20/2017 - 7:15pm
Vulnerability and Resilience Prediction Models
NSA Program Manager
Scalability and Composability
Metrics
Resilient Architectures
NCSU
Vulnerability and Resilience Prediction Models
FY14-18
Apr'17
tearline
Resilience Requirements, Design, and Testing - April 2017
Submitted by drwright on Mon, 03/20/2017 - 7:12pm
Resilience Requirements, Design, and Testing
NSA Program Manager
Metrics
Resilient Architectures
NCSU
Resilience Requirements, Design, and Testing
FY14-18
Apr'17
tearline
NCSU SoS Lablet Research Methods, Community Development and Support - April 2017
Submitted by drwright on Mon, 03/20/2017 - 7:07pm
NSA Program Manager
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
SoS Lablet Research Methods, Community Development and Support
FY14-18
Apr'17
tearline
NCSU SoS Lablet Evaluation -April 2017
Submitted by drwright on Mon, 03/20/2017 - 7:06pm
NSA Program Manager
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
SoS Lablet Evaluation
FY14-18
Apr'17
tearline
SoS Quarterly Summary Report - NCSU - April 2017
Submitted by drwright on Mon, 03/20/2017 - 7:05pm
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
SoS Lablet Evaluation
SoS Lablet Research Methods, Community Development and Support
Support, and Other Projects
A Human Information-Processing Analysis of Online Deception Detection
Attack Surface and Defense-in-Depth Metrics
Automated Synthesis of Resilient Architectures
Formal Specification and Analysis of Security-Critical Norms and Policies
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Privacy Incidents Database
Redundancy for Network Intrusion Prevention Systems (NIPS)
Resilience Requirements, Design, and Testing
Scientific Understanding of Policy Complexity
Smart Isolation in Large-Scale Production Computing Infrastructures
Systematization of Knowledge from Intrusion Detection Models
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Vulnerability and Resilience Prediction Models
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
Apr'17
tearline
Real-time Privacy Risk Evaluation and Enforcement - April 2017
Submitted by Jamie Presken on Mon, 03/13/2017 - 10:17am
Approved by NSA
Metrics
Human Behavior
CMU
Real-time Privacy Risk Evaluation and Enforcement
FY14-18
tearline
Race Vulnerability Study and Hybrid Race Detection (CMU/University of Nebraska, Lincoln Collaborative Proposal) - April 2017
Submitted by Jamie Presken on Mon, 03/13/2017 - 10:16am
Approved by NSA
Scalability and Composability
Metrics
CMU
Race Vulnerability Study and Hybrid Race Detection
FY14-18
tearline
USE: User Security Behavior (CMU/Berkeley/University of Pittsburgh Collaborative Proposal) - April 2017
Submitted by Jamie Presken on Mon, 03/13/2017 - 10:12am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Epistemic Models for Security
Geo-Temporal Characterization of Security Threats
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Race Vulnerability Study and Hybrid Race Detection
Real-time Privacy Risk Evaluation and Enforcement
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
Apr'17
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »