Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» NCSU
NCSU
tearline
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators, and Reducing Vulnerability - July 2014
Submitted by aehunt on Fri, 06/27/2014 - 4:25pm
Approved by NSA
Human Behavior
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
July'14
tearline
Vulnerability and Resilience Prediction Models - July 2014
Submitted by aehunt on Fri, 06/27/2014 - 4:24pm
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
NCSU
Vulnerability and Resilience Prediction Models
FY14-18
July'14
tearline
Systematization of Knowledge from Intrusion Detection Models - July 2014
Submitted by aehunt on Fri, 06/27/2014 - 4:23pm
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
Human Behavior
NCSU
Systematization of Knowledge from Intrusion Detection Models
FY14-18
July'14
tearline
Attack Surface and Defense-in-Depth Metrics - July 2014
Submitted by aehunt on Fri, 06/27/2014 - 4:22pm
Approved by NSA
Scalability and Composability
Metrics
Resilient Architectures
NCSU
Attack Surface and Defense-in-Depth Metrics
tearline
SoS Quarterly Project Report - NCSU (Template)
Submitted by aehunt on Sun, 06/19/1983 - 2:45pm
Business Manager
NCSU
FY14-18
tearline
SoS Quarterly Summary Report - NCSU (Template)
Submitted by aehunt on Sun, 06/19/1983 - 2:45pm
Business Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
FY14-18
tearline
SoS Lablet Annual Report TEMPLATE - NCSU
Submitted by drwright on Sun, 06/19/1983 - 1:36pm
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
A Human Information-Processing Analysis of Online Deception Detection
Attack Surface and Defense-in-Depth Metrics
Automated Synthesis of Resilient Architectures
Formal Specification and Analysis of Security-Critical Norms and Policies
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Redundancy for Network Intrusion Prevention Systems (NIPS)
Resilience Requirements, Design, and Testing
Scientific Understanding of Policy Complexity
Smart Isolation in Large-Scale Production Computing Infrastructures
Systematization of Knowledge from Intrusion Detection Models
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Vulnerability and Resilience Prediction Models
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
« first
‹ previous
…
18
19
20
21
22
23
24
25
26