Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» CMU
CMU
tearline
USE: User Security Behavior (CMU/Berkeley/University of Pittsburgh Collaborative Proposal)
Submitted by Jamie Presken on Wed, 06/10/2015 - 1:34pm
Approved by NSA
Human Behavior
CMU
USE: User Security Behavior
FY14-18
July'15
tearline
Secure Composition of Systems and Policies - July 2015
Submitted by Jamie Presken on Wed, 06/10/2015 - 1:32pm
Approved by NSA
Scalability and Composability
CMU
Secure Composition of Systems and Policies
FY14-18
tearline
Security Reasoning for Distributed Systems with Uncertainty (CMU/Cornell Collaborative Proposal) - July 2015
Submitted by Jamie Presken on Wed, 06/10/2015 - 1:30pm
Approved by NSA
Scalability and Composability
Resilient Architectures
CMU
Security Reasoning for Distributed Systems with Uncertainty
FY14-18
tearline
Usable Formal Methods for the Design and Composition of Security and Privacy Policies (CMU/UTSA Collaborative Proposal) - July 2015
Submitted by Jamie Presken on Wed, 06/10/2015 - 1:29pm
Approved by NSA
CMU
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
FY14-18
tearline
Geo-Temporal Characterization of Security Threats - July 2015
Submitted by Jamie Presken on Wed, 06/10/2015 - 1:28pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Human Behavior
CMU
Geo-Temporal Characterization of Security Threats
FY14-18
July'15
tearline
Highly Configurable Systems - July 2015
Submitted by Jamie Presken on Wed, 06/10/2015 - 1:26pm
Approved by NSA
Scalability and Composability
CMU
Highly Configurable Systems
FY14-18
tearline
SoS Lablet Annual Report - CMU
Submitted by Heather Lucas on Mon, 04/13/2015 - 10:33am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Epistemic Models for Security
Geo-Temporal Characterization of Security Threats
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Race Vulnerability Study and Hybrid Race Detection
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
FY14-18
Apr'15
tearline
Highly Configurable Systems - April 2015
Submitted by Jamie Presken on Wed, 03/04/2015 - 7:40am
Approved by NSA
Scalability and Composability
CMU
Highly Configurable Systems
FY14-18
tearline
Geo-Temporal Characterization of Security Threat - April 2015
Submitted by Jamie Presken on Wed, 03/04/2015 - 7:39am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Human Behavior
CMU
Geo-Temporal Characterization of Security Threats
FY14-18
Apr'15
tearline
Usable Formal Methods for the Design and Composition of Security and Privacy Policies (CMU/UTSA Collaborative Proposal)
Submitted by Jamie Presken on Wed, 03/04/2015 - 7:39am
Approved by NSA
CMU
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
FY14-18
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
next ›
last »