Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
CPS Technologies
biblio
Less is More?: Investigating the Role of Examples in Security Studies Using Analogical Transfer
Submitted by arao on Wed, 09/17/2014 - 6:30pm
Systems Engineering
ACM CCS
Analogical Transfer
CPS Technologies
cyber security
foundations
Human and Societal Aspects of Security and Privacy
Human Factors
psychology
Science of Security
security
Social Aspects of Security and Privacy
systems engineering
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
ACM CCS
Cyber Security
Social Aspects of Security and Privacy
Human and Societal Aspects of Security and Privacy
biblio
Open vs. Closed Systems for Accountability
Submitted by adj on Wed, 09/17/2014 - 6:30pm
Systems Engineering
Science of Security
CPS Technologies
Foundations
accountability
ACM CCS
CPS Technologies
Database and Storage Security
foundations
identity
Information Accountability and Usage Control
Science of Security
systems engineering
utility
ACM CCS
Database and Storage Security
Information Accountability and Usage Control
biblio
Architecture-based Self-protection: Composing and Reasoning About Denial-of-service Mitigations
Submitted by David Garlan on Wed, 09/17/2014 - 6:30pm
Architectures
Architectures
Modeling
Science of Security
Validation and Verification
CPS Technologies
Foundations
Hardware Security Implementation
validation and verification
Self-Adaptation
Security in Hardware
Science of Security
Probabilistic Model Checking
modeling
Logic and Verification
Hardware-Based Security Protocols
ACM CCS
foundations
Formal Security Models
Formal Methods and Theory of Security
Denial-of-Service
cyber security
CPS Technologies
Architectures
ACM CCS
Hardware-Based Security Protocols
Cyber Security
Formal Security Models
Formal Methods and Theory of Security
Logic and Verification
Hardware Security Implementation
Security in Hardware
« first
‹ previous
1
2
3