Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SoS Lablet
file
Agent-Based Modeling of User Circumvention of Security
Submitted by awhitesell on Fri, 12/16/2016 - 3:42pm
Science of Security
Human and Societal Aspects of Security and Privacy
Human behavior
NSA SoS Lablets Materials
Science of Human Circumvention of Security
Science of Security
SoS Lablet
UIUC
UIUC
Human and Societal Aspects of Security and Privacy
NSA SoS Lablets Materials
Science of Human Circumvention of Security
biblio
Rethinking Security Requirements in RE Research
Submitted by Katie Dey on Fri, 10/24/2014 - 12:52pm
Science of Security
CMU
Human behavior
literature survey
Metrics
privacy
Requirements
Science of Security
security
SoS Lablet
usability
CMU
biblio
Characterizations and boundaries of security requirements patterns
Submitted by Katie Dey on Fri, 10/24/2014 - 12:52pm
Science of Security
security
Unified modeling language
SoS Lablet
Software systems
software engineering
software development life cycle
Silicon
security requirements patterns
security requirements
security of data
security aspects
boundaries
Science of Security
Patterns
Metrics
Human behavior
Guidelines
defining format
Context
CMU
characterizations
CMU
biblio
Wyvern: A Simple, Typed, and Pure Object-oriented Language
Submitted by Katie Dey on Fri, 10/24/2014 - 12:52pm
Science of Security
A Language and Framework for Development of Secure Mobile Applications
first-class classes
Human behavior
object-oriented
Scalability and Composability
SoS Lablet
static type checking
A Language and Framework for Development of Secure Mobile Applications
CMU
biblio
The Power of Interoperability: Why Objects Are Inevitable
Submitted by Katie Dey on Fri, 10/24/2014 - 12:51pm
Science of Security
A Language and Framework for Development of Secure Mobile Applications
Frameworks
Human behavior
interoperability
object-oriented programming
Scalability and Composability
service abstractions
SoS Lablet
A Language and Framework for Development of Secure Mobile Applications
CMU
biblio
Security Through Extensible Type Systems
Submitted by Katie Dey on Fri, 10/24/2014 - 12:51pm
Science of Security
A Language and Framework for Development of Secure Mobile Applications
extensibility
Human behavior
Scalability and Composability
security
SoS Lablet
A Language and Framework for Development of Secure Mobile Applications
CMU
biblio
Declarative Access Policies Based on Objects, Relationships, and States
Submitted by Katie Dey on Fri, 10/24/2014 - 12:51pm
Science of Security
A Language and Framework for Development of Secure Mobile Applications
access policies
Human behavior
protocol
relationship
Scalability and Composability
SoS Lablet
state
A Language and Framework for Development of Secure Mobile Applications
CMU
biblio
Longitudinal analysis of a large corpus of cyber threat descriptions
Submitted by kathleen.carley on Fri, 10/24/2014 - 12:51pm
Science of Security
CMU
Geo-Temporal Characterization of Security Threats
Policy-Governed Secure Collaboration
SoS Lablet
Geo-Temporal Characterization of Security Threats
CMU
biblio
A fresh look at network science: Interdependent multigraphs models inspired from statistical physics
Submitted by John Baras on Fri, 10/24/2014 - 12:51pm
network topology
Human behavior
hybrid network
interacting dynamic multigraphs
interdependent multigraphs models
multi-robot systems
multimetric problems
network science
network science perspective
network theory (graphs)
Games
Peer-to-peer computing
Physics
social network
SoS Lablet
statistical physics
Stochastic processes
trust
Trust, Recommendation Systems, and Collaboration
constrained coalitional games
Biological system modeling
coevolving multigraphs
collaboration
collaboration multigraphs
collaborative control
communication multigraphs
Communication Network
communication topology
complex networks
biological network
constrained coalitional network games
control network
cooperative multi-agent systems
cooperative swarms
distributed task execution
economic network
expander graphs
game theory
biblio
Agent-based Modeling of User Circumvention of Security
Submitted by Katie Dey on Fri, 10/24/2014 - 12:51pm
Science of Security
Human and Societal Aspects of Security and Privacy
Human behavior
NSA SoS Lablets Materials
Science of Human Circumvention of Security
Science of Security
SoS Lablet
UIUC
UIUC
Human and Societal Aspects of Security and Privacy
NSA SoS Lablets Materials
Science of Human Circumvention of Security
1
2
next ›
last »