Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» JAN'15
Jan'15
biblio
One Phish, Two Phish, How to Avoid the Internet Phish: Analysis of Training Strategies to Detect Phishing Emails
Submitted by drwright on Sun, 01/11/2015 - 4:09pm
Human behavior
Jan'15
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
Human Behavior
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
Jan'15
biblio
SharkFin: Spatio-temporal mining of software adoption and penetration
Submitted by tdumitra on Fri, 01/09/2015 - 9:35pm
data analysis
Empirical Models for Vulnerability Exploits
Internet security
Jan'15
Malware propagation
Metrics
UMD
Metrics
UMD
Empirical Models for Vulnerability Exploits
UMD PROJECTS:
Jan'15
Empirical Models for Vulnerability Exploits
tearline
SoS Quarterly Summary Report - Oct to Dec 2014 - January 2015
Submitted by awhitesell on Fri, 01/09/2015 - 4:43pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UIUC
UIUC PROJECTS:
FY14-18
Jan'15
tearline
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems - January 2015
Submitted by awhitesell on Fri, 01/09/2015 - 2:26pm
Approved by NSA
Scalability and Composability
Metrics
UIUC
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
FY14-18
Jan'15
tearline
Trust, Recommendation Systems, and Collaboration - UMD - January 2015
Submitted by jkatz on Fri, 01/09/2015 - 2:13pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Human Behavior
UMD
Trust, Recommendation Systems, and Collaboration
FY14-18
Jan'15
tearline
User-Centered Design for Security - UMD - January 2015
Submitted by jkatz on Fri, 01/09/2015 - 2:12pm
Approved by NSA
Metrics
Human Behavior
UMD
User-Centered Design for Security
FY14-18
Jan'15
tearline
Data Driven Security Models and Analysis - January 2015
Submitted by awhitesell on Fri, 01/09/2015 - 2:03pm
Approved by NSA
Metrics
Resilient Architectures
Human Behavior
UIUC
Data Driven Security Models and Analysis
FY14-18
Jan'15
tearline
SoS Quarterly Summary Report - UMD - January 2015
Submitted by jkatz on Fri, 01/09/2015 - 1:53pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UMD
Does the Presence of Honest Users Affect Intruders' Behavior
Empirical Models for Vulnerability Exploits
Human Behavior and Cyber Vulnerabilities
Reasoning about Protocols with Human Participants
Trust, Recommendation Systems, and Collaboration
Trustworthy and Composable Software Systems with Contracts
Understanding Developers' Reasoning about Privacy and Security
User-Centered Design for Security
Verification of Hyperproperties
FY14-18
Jan'15
tearline
A Hypothesis Testing Framework for Network Security - January 2015
Submitted by awhitesell on Fri, 01/09/2015 - 12:51pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
UIUC
A Hypothesis Testing Framework for Network Security
FY14-18
Jan'15
tearline
Science of Human Circumvention of Security - January 2015
Submitted by awhitesell on Fri, 01/09/2015 - 12:22pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Human Behavior
UIUC
Science of Human Circumvention of Security
FY14-18
Jan'15
« first
‹ previous
1
2
3
4
5
next ›
last »