Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» NCSU
NCSU
tearline
Automated Synthesis of Resilient Architectures - October 2016
Submitted by drwright on Wed, 09/14/2016 - 8:21am
Automated Synthesis of Resilient Architectures
NSA Program Manager
Resilient Architectures
NCSU
Automated Synthesis of Resilient Architectures
FY14-18
Oct'16
tearline
NCSU SoS Lablet Research Methods, Community Development and Support - October 2016
Submitted by drwright on Wed, 09/14/2016 - 8:19am
NSA Program Manager
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
NCSU PROJECTS:(select all that apply)
FY14-18
Oct'16
tearline
NCSU SoS Lablet Evaluation - October 2016
Submitted by drwright on Wed, 09/14/2016 - 8:17am
NSA Program Manager
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
NCSU PROJECTS:(select all that apply)
FY14-18
Oct'16
tearline
Privacy Incidents Database - October 2016
Submitted by drwright on Wed, 09/14/2016 - 8:13am
Privacy Incidents Database
NSA Program Manager
Policy-Governed Secure Collaboration
NCSU
Privacy Incidents Database
FY14-18
Oct'16
tearline
SoS Quarterly Summary Report - NCSU - October 2016
Submitted by drwright on Wed, 09/14/2016 - 8:09am
Round 2 Projects
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
A Human Information-Processing Analysis of Online Deception Detection
Attack Surface and Defense-in-Depth Metrics
Automated Synthesis of Resilient Architectures
Formal Specification and Analysis of Security-Critical Norms and Policies
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Redundancy for Network Intrusion Prevention Systems (NIPS)
Resilience Requirements, Design, and Testing
Scientific Understanding of Policy Complexity
Smart Isolation in Large-Scale Production Computing Infrastructures
Systematization of Knowledge from Intrusion Detection Models
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Vulnerability and Resilience Prediction Models
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
Oct'16
biblio
Practical DIFC Enforcement on Android
Submitted by enck on Thu, 06/23/2016 - 9:48am
NCSU
Oct'16
Resilient Architectures
Smart Isolation in Large-Scale Production Computing Infrastructures
Smart Isolation in Large-Scale Production Computing Infrastructures
Resilient Architectures
NCSU
Smart Isolation in Large-Scale Production Computing Infrastructures
Oct'16
biblio
Silk: A Simulation Study of Regulating Open Normative Multiagent Systems
Submitted by mpsingh on Mon, 06/20/2016 - 12:52pm
July'16
NCSU
Policy-Governed Secure Collaboration
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Policy-Governed Secure Collaboration
NCSU
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
July'16
biblio
Coco: Runtime Reasoning about Conflicting Commitments
Submitted by mpsingh on Mon, 06/20/2016 - 12:49pm
Commitments
Formal Specification and Analysis of Security-Critical Norms and Policies
July'16
NCSU
Norms
Policy-Governed Secure Collaboration
reasoning about conflicts
Policy-Governed Secure Collaboration
NCSU
Formal Specification and Analysis of Security-Critical Norms and Policies
July'16
tearline
SoS Quarterly Summary Report - NCSU - July 2016
Submitted by drwright on Mon, 06/13/2016 - 9:33am
Round 2 Projects
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
A Human Information-Processing Analysis of Online Deception Detection
Attack Surface and Defense-in-Depth Metrics
Automated Synthesis of Resilient Architectures
Formal Specification and Analysis of Security-Critical Norms and Policies
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Redundancy for Network Intrusion Prevention Systems (NIPS)
Resilience Requirements, Design, and Testing
Scientific Understanding of Policy Complexity
Smart Isolation in Large-Scale Production Computing Infrastructures
Systematization of Knowledge from Intrusion Detection Models
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Vulnerability and Resilience Prediction Models
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
July'16
tearline
Privacy Incidents Database - July 2016
Submitted by drwright on Mon, 06/13/2016 - 9:31am
Privacy Incidents Database
Approved by NSA
Policy-Governed Secure Collaboration
NCSU
Privacy Incidents Database
FY14-18
July'16
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »