Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
CMU
file
Sadeghi_Ensuring_Consistency_DG.pdf
Submitted by Jamie Presken on Tue, 07/11/2017 - 1:43pm
Adaptive software
August'17
CMU
Component-Based Software
Scalability and Composability
Science of Secure Frameworks
update criteria
biblio
Ensuring the Consistency of Adaptation through Inter- and Intra-Component Dependency Analysis
Submitted by Jamie Presken on Tue, 07/11/2017 - 1:43pm
Adaptive software
August'17
CMU
Component-Based Software
Scalability and Composability
Science of Secure Frameworks
update criteria
Scalability and Composability
CMU
Science of Secure Frameworks
August'17
file
Sadeghi_Taxonomy_Qual_Comparison_DG.pdf
Submitted by Jamie Presken on Tue, 07/11/2017 - 1:39pm
August'17
CMU
Scalability and Composability
Science of Secure Frameworks
biblio
A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software
Submitted by Jamie Presken on Tue, 07/11/2017 - 1:39pm
August'17
CMU
Scalability and Composability
Science of Secure Frameworks
Scalability and Composability
CMU
Science of Secure Frameworks
August'17
biblio
DELDroid: Determination and Enforcement of Least-Privilege Architecture in Android
Submitted by Jamie Presken on Tue, 07/11/2017 - 1:30pm
August'17
CMU
Scalability and Composability
Science of Secure Frameworks
Scalability and Composability
CMU
Science of Secure Frameworks
August'17
file
Hammad_DELDroid_DG.pdf
Submitted by Jamie Presken on Tue, 07/11/2017 - 1:30pm
August'17
CMU
Scalability and Composability
Science of Secure Frameworks
file
Tan_Unicorns_LC.pdf
Submitted by Jamie Presken on Tue, 07/11/2017 - 1:17pm
August'17
CMU
Human behavior
usability; key fingerprints; authentication; secure messaging
USE: User Security Behavior
biblio
Can Unicorns Help Users Compare Crypto Key Fingerprints?
Submitted by Jamie Presken on Tue, 07/11/2017 - 1:17pm
August'17
CMU
Human behavior
usability; key fingerprints; authentication; secure messaging
USE: User Security Behavior
Human Behavior
CMU
USE: User Security Behavior
August'17
biblio
Replication: Challenges in Using Data Logs to Validate Phishing Detection Ability Metrics
Submitted by Jamie Presken on Tue, 07/11/2017 - 1:07pm
August'17
CMU
Human behavior
USE: User Security Behavior
Human Behavior
CMU
USE: User Security Behavior
August'17
file
Yu_SimExplorer_JA.pdf
Submitted by Jamie Presken on Tue, 07/11/2017 - 12:18pm
August'17
CMU
Kernel
Metrics
processes
race conditions
Race Vulnerability Study and Hybrid Race Detection
Scalability and Composability
Software Testing
virtual platforms
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »