Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» HUMAN BEHAVIOR
Human Behavior
tearline
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators, and Reducing Vulnerability - April 2015
Submitted by drwright on Sun, 03/22/2015 - 12:18pm
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Approved by NSA
Human Behavior
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
Apr'15
tearline
Systematization of Knowledge from Intrusion Detection Models - April 2015
Submitted by drwright on Sun, 03/22/2015 - 12:15pm
Systematization of Knowledge from Intrusion Detection Models
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
Human Behavior
NCSU
Systematization of Knowledge from Intrusion Detection Models
FY14-18
Apr'15
tearline
Geo-Temporal Characterization of Security Threat - April 2015
Submitted by Jamie Presken on Wed, 03/04/2015 - 7:39am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Human Behavior
CMU
Geo-Temporal Characterization of Security Threats
FY14-18
Apr'15
tearline
USE: User Security Behavior (CMU/Berkeley/University of Pittsburgh Collaborative Proposal)
Submitted by Jamie Presken on Wed, 03/04/2015 - 7:32am
Approved by NSA
Human Behavior
CMU
USE: User Security Behavior
FY14-18
Apr'15
tearline
A Language and Framework for Development of Secure Mobile Applications - April 2015
Submitted by Jamie Presken on Wed, 03/04/2015 - 7:31am
Approved by NSA
Scalability and Composability
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
FY14-18
tearline
SoS Quarterly Summary Report - CMU - January 2015
Submitted by scherlis on Thu, 01/15/2015 - 12:19pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Epistemic Models for Security
Geo-Temporal Characterization of Security Threats
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Race Vulnerability Study and Hybrid Race Detection
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
FY14-18
Jan'15
biblio
One Phish, Two Phish, How to Avoid the Internet Phish: Analysis of Training Strategies to Detect Phishing Emails
Submitted by drwright on Sun, 01/11/2015 - 3:09pm
Human behavior
Jan'15
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
Human Behavior
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
Jan'15
tearline
SoS Quarterly Summary Report - Oct to Dec 2014 - January 2015
Submitted by awhitesell on Fri, 01/09/2015 - 3:43pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UIUC
UIUC PROJECTS:
FY14-18
Jan'15
tearline
Trust, Recommendation Systems, and Collaboration - UMD - January 2015
Submitted by jkatz on Fri, 01/09/2015 - 1:13pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Human Behavior
UMD
Trust, Recommendation Systems, and Collaboration
FY14-18
Jan'15
tearline
User-Centered Design for Security - UMD - January 2015
Submitted by jkatz on Fri, 01/09/2015 - 1:12pm
Approved by NSA
Metrics
Human Behavior
UMD
User-Centered Design for Security
FY14-18
Jan'15
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »