Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» RESILIENT ARCHITECTURES
Resilient Architectures
tearline
Vulnerability and Resilience Prediction Models - July 2015
Submitted by drwright on Wed, 06/17/2015 - 10:27am
Vulnerability and Resilience Prediction Models
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
NCSU
Vulnerability and Resilience Prediction Models
FY14-18
July'15
tearline
Systematization of Knowledge from Intrusion Detection Models - July 2015
Submitted by drwright on Wed, 06/17/2015 - 10:27am
Systematization of Knowledge from Intrusion Detection Models
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
Human Behavior
NCSU
Systematization of Knowledge from Intrusion Detection Models
FY14-18
July'15
tearline
Attack Surface and Defense-in-Depth Metrics - July 2015
Submitted by drwright on Wed, 06/17/2015 - 10:27am
Attack Surface and Defense-in-Depth Metrics
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
NCSU
Attack Surface and Defense-in-Depth Metrics
tearline
Redundancy for Network Intrusion Prevention Systems (NIPS) - July 2015
Submitted by drwright on Wed, 06/17/2015 - 10:23am
Redundancy for Network Intrusion Prevention Systems (NIPS)
NSA Program Manager
Resilient Architectures
NCSU
Redundancy for Network Intrusion Prevention Systems (NIPS)
FY14-18
July'15
tearline
SoS Quarterly Summary Report - NCSU - July 2015
Submitted by drwright on Wed, 06/17/2015 - 10:15am
Round 2 Projects
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
A Human Information-Processing Analysis of Online Deception Detection
Attack Surface and Defense-in-Depth Metrics
Automated Synthesis of Resilient Architectures
Formal Specification and Analysis of Security-Critical Norms and Policies
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Redundancy for Network Intrusion Prevention Systems (NIPS)
Resilience Requirements, Design, and Testing
Scientific Understanding of Policy Complexity
Smart Isolation in Large-Scale Production Computing Infrastructures
Systematization of Knowledge from Intrusion Detection Models
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Vulnerability and Resilience Prediction Models
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
July'15
tearline
Multi-model run-time security analysis - July 2015
Submitted by Jamie Presken on Wed, 06/10/2015 - 2:33pm
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
Multi-Model Run-Time Security Analysis
tearline
Science of Secure Frameworks (CMU/Wayne State University/George Mason University Collaborative Proposal) - July 2015
Submitted by Jamie Presken on Wed, 06/10/2015 - 2:31pm
Approved by NSA
Scalability and Composability
Resilient Architectures
Science of Secure Frameworks
tearline
Security Reasoning for Distributed Systems with Uncertainty (CMU/Cornell Collaborative Proposal) - July 2015
Submitted by Jamie Presken on Wed, 06/10/2015 - 2:30pm
Approved by NSA
Scalability and Composability
Resilient Architectures
CMU
Security Reasoning for Distributed Systems with Uncertainty
FY14-18
tearline
Smart Isolation in Large-Scale Production Computing Infrastructures - July 2015
Submitted by drwright on Mon, 06/08/2015 - 3:36pm
Smart Isolation in Large-Scale Production Computing Infrastructures
NSA Program Manager
Resilient Architectures
NCSU
Smart Isolation in Large-Scale Production Computing Infrastructures
FY14-18
July'15
tearline
SoS Lablet Annual Report - UIUC
Submitted by Heather Lucas on Sun, 04/19/2015 - 11:48am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UIUC
A Hypothesis Testing Framework for Network Security
Data Driven Security Models and Analysis
Data-Driven Model-Based Decision-Making
Science of Human Circumvention of Security
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
FY14-18
Apr'15
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »