Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» RESILIENT ARCHITECTURES
Resilient Architectures
tearline
NCSU SoS Lablet Research Methods, Community Development and Support - April 2017
Submitted by drwright on Mon, 03/20/2017 - 7:07pm
NSA Program Manager
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
SoS Lablet Research Methods, Community Development and Support
FY14-18
Apr'17
tearline
NCSU SoS Lablet Evaluation -April 2017
Submitted by drwright on Mon, 03/20/2017 - 7:06pm
NSA Program Manager
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
SoS Lablet Evaluation
FY14-18
Apr'17
tearline
SoS Quarterly Summary Report - NCSU - April 2017
Submitted by drwright on Mon, 03/20/2017 - 7:05pm
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
SoS Lablet Evaluation
SoS Lablet Research Methods, Community Development and Support
Support, and Other Projects
A Human Information-Processing Analysis of Online Deception Detection
Attack Surface and Defense-in-Depth Metrics
Automated Synthesis of Resilient Architectures
Formal Specification and Analysis of Security-Critical Norms and Policies
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Privacy Incidents Database
Redundancy for Network Intrusion Prevention Systems (NIPS)
Resilience Requirements, Design, and Testing
Scientific Understanding of Policy Complexity
Smart Isolation in Large-Scale Production Computing Infrastructures
Systematization of Knowledge from Intrusion Detection Models
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Vulnerability and Resilience Prediction Models
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
Apr'17
tearline
USE: User Security Behavior (CMU/Berkeley/University of Pittsburgh Collaborative Proposal) - April 2017
Submitted by Jamie Presken on Mon, 03/13/2017 - 10:12am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Epistemic Models for Security
Geo-Temporal Characterization of Security Threats
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Race Vulnerability Study and Hybrid Race Detection
Real-time Privacy Risk Evaluation and Enforcement
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
Apr'17
tearline
Science of Secure Frameworks (CMU/Wayne State University/George Mason University Collaborative Proposal) - April 2017
Submitted by Jamie Presken on Mon, 03/13/2017 - 10:10am
Approved by NSA
Scalability and Composability
Resilient Architectures
Science of Secure Frameworks
tearline
Multi-model run-time security analysis - April 2017
Submitted by Jamie Presken on Mon, 03/13/2017 - 10:09am
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
Multi-Model Run-Time Security Analysis
tearline
Security Reasoning for Distributed Systems with Uncertainty (CMU/Cornell Collaborative Proposal) - April 2017
Submitted by Jamie Presken on Mon, 03/13/2017 - 10:06am
Approved by NSA
Scalability and Composability
Resilient Architectures
CMU
Security Reasoning for Distributed Systems with Uncertainty
FY14-18
tearline
SoS Quarterly Summary Report - CMU - April 2017
Submitted by Jamie Presken on Mon, 03/13/2017 - 9:57am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Epistemic Models for Security
Geo-Temporal Characterization of Security Threats
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Race Vulnerability Study and Hybrid Race Detection
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
Apr'17
tearline
SoS Quarterly Summary Report - UMD - January 2017
Submitted by jkatz on Wed, 02/01/2017 - 9:13am
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UMD
UMD PROJECTS:
Jan'17
tearline
SoS Quarterly Summary Report - January 2017
Submitted by awhitesell on Wed, 01/11/2017 - 10:48am
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UIUC
FY14-18
Jan'17
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »