Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» UMD
UMD
tearline
Empirical Models for Vulnerability Exploits - UMD - April 2015
Submitted by jkatz on Thu, 03/26/2015 - 11:40am
Approved by NSA
Metrics
UMD
Empirical Models for Vulnerability Exploits
FY14-18
Apr'15
tearline
User-Centered Design for Security - UMD - April 2015
Submitted by jkatz on Thu, 03/26/2015 - 11:39am
NSA Program Manager
Metrics
Human Behavior
UMD
User-Centered Design for Security
FY14-18
Apr'15
tearline
Trust, Recommendation Systems, and Collaboration - UMD - April 2015
Submitted by jkatz on Thu, 03/26/2015 - 11:37am
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Human Behavior
UMD
Trust, Recommendation Systems, and Collaboration
FY14-18
Apr'15
biblio
Some Vulnerabilities Are Different Than Others: Studying Vulnerabilities and Attack Surfaces in the Wild
Submitted by tdumitra on Fri, 01/09/2015 - 9:43pm
Empirical Models for Vulnerability Exploits
Metrics
Oct'14
UMD
Metrics
UMD
Empirical Models for Vulnerability Exploits
UMD PROJECTS:
Oct'14
Empirical Models for Vulnerability Exploits
biblio
SharkFin: Spatio-temporal mining of software adoption and penetration
Submitted by tdumitra on Fri, 01/09/2015 - 9:35pm
data analysis
Empirical Models for Vulnerability Exploits
Internet security
Jan'15
Malware propagation
Metrics
UMD
Metrics
UMD
Empirical Models for Vulnerability Exploits
UMD PROJECTS:
Jan'15
Empirical Models for Vulnerability Exploits
tearline
Trust, Recommendation Systems, and Collaboration - UMD - January 2015
Submitted by jkatz on Fri, 01/09/2015 - 2:13pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Human Behavior
UMD
Trust, Recommendation Systems, and Collaboration
FY14-18
Jan'15
tearline
User-Centered Design for Security - UMD - January 2015
Submitted by jkatz on Fri, 01/09/2015 - 2:12pm
Approved by NSA
Metrics
Human Behavior
UMD
User-Centered Design for Security
FY14-18
Jan'15
tearline
SoS Quarterly Summary Report - UMD - January 2015
Submitted by jkatz on Fri, 01/09/2015 - 1:53pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UMD
Does the Presence of Honest Users Affect Intruders' Behavior
Empirical Models for Vulnerability Exploits
Human Behavior and Cyber Vulnerabilities
Reasoning about Protocols with Human Participants
Trust, Recommendation Systems, and Collaboration
Trustworthy and Composable Software Systems with Contracts
Understanding Developers' Reasoning about Privacy and Security
User-Centered Design for Security
Verification of Hyperproperties
FY14-18
Jan'15
tearline
Empirical Models for Vulnerability Exploits - UMD - January 2015
Submitted by tdumitra on Thu, 01/08/2015 - 7:56am
Approved by NSA
Metrics
UMD
Empirical Models for Vulnerability Exploits
FY14-18
Jan'15
tearline
Human Behavior and Cyber Vulnerabilities - UMD - January 2015
Submitted by tdumitra on Thu, 01/08/2015 - 7:40am
Approved by NSA
Metrics
Human Behavior
UMD
Human Behavior and Cyber Vulnerabilities
FY14-18
Jan'15
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »