Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» HUMAN BEHAVIOR
Human Behavior
tearline
Scientific Understanding of Policy Complexity - October 2015
Submitted by drwright on Mon, 09/21/2015 - 8:09am
Scientific Understanding of Policy Complexity
Approved by NSA
Policy-Governed Secure Collaboration
Human Behavior
NCSU
Scientific Understanding of Policy Complexity
FY14-18
Oct'15
tearline
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security - October 2015
Submitted by drwright on Mon, 09/21/2015 - 8:08am
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Approved by NSA
Human Behavior
NCSU
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
FY14-18
Oct'15
tearline
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators, and Reducing Vulnerability - October 2015
Submitted by drwright on Mon, 09/21/2015 - 8:07am
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Approved by NSA
Human Behavior
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
Oct'15
tearline
Systematization of Knowledge from Intrusion Detection Models - October 2015
Submitted by drwright on Mon, 09/21/2015 - 8:04am
Systematization of Knowledge from Intrusion Detection Models
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
Human Behavior
NCSU
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Redundancy for Network Intrusion Prevention Systems (NIPS)
Resilience Requirements, Design, and Testing
Scientific Understanding of Policy Complexity
Smart Isolation in Large-Scale Production Computing Infrastructures
FY14-18
Oct'15
tearline
SoS Quarterly Summary Report - NCSU - October 2015
Submitted by drwright on Mon, 09/21/2015 - 8:02am
Round 2 Projects
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
A Human Information-Processing Analysis of Online Deception Detection
Attack Surface and Defense-in-Depth Metrics
Automated Synthesis of Resilient Architectures
Formal Specification and Analysis of Security-Critical Norms and Policies
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Redundancy for Network Intrusion Prevention Systems (NIPS)
Resilience Requirements, Design, and Testing
Scientific Understanding of Policy Complexity
Smart Isolation in Large-Scale Production Computing Infrastructures
Systematization of Knowledge from Intrusion Detection Models
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Vulnerability and Resilience Prediction Models
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
Oct'15
tearline
Geo-Temporal Characterization of Security Threats - October 2015
Submitted by Jamie Presken on Thu, 09/17/2015 - 6:31am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Human Behavior
CMU
Geo-Temporal Characterization of Security Threats
FY14-18
Oct'15
tearline
USE: User Security Behavior (CMU/Berkeley/University of Pittsburgh Collaborative Proposal) - October 2015
Submitted by Jamie Presken on Thu, 09/17/2015 - 6:24am
Approved by NSA
Human Behavior
CMU
USE: User Security Behavior
FY14-18
Oct'15
tearline
A Language and Framework for Development of Secure Mobile Applications - October 2015
Submitted by Jamie Presken on Thu, 09/17/2015 - 6:22am
Approved by NSA
Scalability and Composability
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
FY14-18
tearline
SoS Quarterly Summary Report - CMU - July 2015
Submitted by Jamie Presken on Mon, 07/20/2015 - 12:46pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Epistemic Models for Security
Geo-Temporal Characterization of Security Threats
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Race Vulnerability Study and Hybrid Race Detection
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
July'15
tearline
Measuring and Improving Management of Today's PKI - UMD - July 2015
Submitted by jkatz on Mon, 07/13/2015 - 11:34am
Approved by NSA
Metrics
Human Behavior
UMD
Measuring and Improving Management of Today's PKI
FY14-18
July'15
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »