Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
Home
All
CMU
NCSU
UIUC
UMD
Publications
HSR Guidance
Logo Directory
Members
Files
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» CMU
CMU
biblio
An Advanced Persistent Threat Exemplar
Submitted by Jamie Presken on Thu, 10/12/2017 - 8:01am
CMU
October'17
Science of Security
CMU
October'17
tearline
2017 SoS Lablet Annual Report - CMU
Submitted by Jamie Presken on Thu, 09/28/2017 - 11:59am
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Epistemic Models for Security
Geo-Temporal Characterization of Security Threats
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Race Vulnerability Study and Hybrid Race Detection
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
FY14-18
biblio
Improved cyber threat indicator sharing by scoring privacy risk
Submitted by Jamie Presken on Tue, 08/01/2017 - 1:58pm
August'17
CMU
cyber security
information sharing
privacy
Real-time Privacy Risk Evaluation and Enforcement
Risk
threat indicators
CMU
Real-time Privacy Risk Evaluation and Enforcement
August'17
biblio
Software certification in practice: how are standards being applied?
Submitted by Jamie Presken on Wed, 07/12/2017 - 7:56am
August'17
CMU
Highly Configurable Systems
Scalability and Composability
Scalability and Composability
CMU
Highly Configurable Systems
August'17
biblio
Ensuring the Consistency of Adaptation through Inter- and Intra-Component Dependency Analysis
Submitted by Jamie Presken on Tue, 07/11/2017 - 2:43pm
Adaptive software
August'17
CMU
Component-Based Software
Scalability and Composability
Science of Secure Frameworks
update criteria
Scalability and Composability
CMU
Science of Secure Frameworks
August'17
biblio
A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software
Submitted by Jamie Presken on Tue, 07/11/2017 - 2:39pm
August'17
CMU
Scalability and Composability
Science of Secure Frameworks
Scalability and Composability
CMU
Science of Secure Frameworks
August'17
biblio
DELDroid: Determination and Enforcement of Least-Privilege Architecture in Android
Submitted by Jamie Presken on Tue, 07/11/2017 - 2:30pm
August'17
CMU
Scalability and Composability
Science of Secure Frameworks
Scalability and Composability
CMU
Science of Secure Frameworks
August'17
biblio
Can Unicorns Help Users Compare Crypto Key Fingerprints?
Submitted by Jamie Presken on Tue, 07/11/2017 - 2:17pm
August'17
CMU
Human behavior
usability; key fingerprints; authentication; secure messaging
USE: User Security Behavior
Human Behavior
CMU
USE: User Security Behavior
August'17
biblio
Replication: Challenges in Using Data Logs to Validate Phishing Detection Ability Metrics
Submitted by Jamie Presken on Tue, 07/11/2017 - 2:07pm
August'17
CMU
Human behavior
USE: User Security Behavior
Human Behavior
CMU
USE: User Security Behavior
August'17
biblio
An automated framework to support testing for process-level race conditions
Submitted by Jamie Presken on Tue, 07/11/2017 - 1:18pm
August'17
CMU
Kernel
Metrics
processes
race conditions
Race Vulnerability Study and Hybrid Race Detection
Scalability and Composability
Software Testing
virtual platforms
Scalability and Composability
Metrics
CMU
Race Vulnerability Study and Hybrid Race Detection
August'17
1
2
3
4
5
6
7
8
9
…
next ›
last »