Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» APR'15
Apr'15
biblio
An Architecture Style for Android Security Analysis
Submitted by Jamie Presken on Mon, 02/15/2016 - 12:01pm
Apr'15
CMU
CMU
Apr'15
biblio
Analysis of Android Inter-App Security Vulnerabilities Using COVERT
Submitted by Jamie Presken on Mon, 02/15/2016 - 11:55am
Apr'15
CMU
CMU
Apr'15
biblio
Composable and Hygienic Typed Syntax Macros
Submitted by Jamie Presken on Wed, 02/10/2016 - 3:49pm
Apr'15
CMU
extensible syntax; macros; hygiene; type inference
CMU
Apr'15
tearline
SoS Lablet Annual Report - UIUC
Submitted by Heather Lucas on Sun, 04/19/2015 - 11:48am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UIUC
A Hypothesis Testing Framework for Network Security
Data Driven Security Models and Analysis
Data-Driven Model-Based Decision-Making
Science of Human Circumvention of Security
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
FY14-18
Apr'15
tearline
SoS Lablet Annual Report - NCSU
Submitted by Heather Lucas on Mon, 04/13/2015 - 11:46am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
NCSU
A Human Information-Processing Analysis of Online Deception Detection
Attack Surface and Defense-in-Depth Metrics
Automated Synthesis of Resilient Architectures
Formal Specification and Analysis of Security-Critical Norms and Policies
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Redundancy for Network Intrusion Prevention Systems (NIPS)
Resilience Requirements, Design, and Testing
Scientific Understanding of Policy Complexity
Smart Isolation in Large-Scale Production Computing Infrastructures
Systematization of Knowledge from Intrusion Detection Models
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Vulnerability and Resilience Prediction Models
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
FY14-18
Apr'15
tearline
SoS Lablet Annual Report - CMU
Submitted by Heather Lucas on Mon, 04/13/2015 - 11:33am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Epistemic Models for Security
Geo-Temporal Characterization of Security Threats
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Race Vulnerability Study and Hybrid Race Detection
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
FY14-18
Apr'15
tearline
SoS Quarterly Summary Report - UMD - April 2015
Submitted by jkatz on Sun, 04/12/2015 - 9:33pm
NSA Program Manager
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UMD
Does the Presence of Honest Users Affect Intruders' Behavior
Empirical Models for Vulnerability Exploits
Human Behavior and Cyber Vulnerabilities
Measuring and Improving Management of Today's PKI
Reasoning about Protocols with Human Participants
Trust, Recommendation Systems, and Collaboration
Trustworthy and Composable Software Systems with Contracts
Understanding Developers' Reasoning about Privacy and Security
Understanding How Users Process Security Advice
User-Centered Design for Security
Verification of Hyperproperties
FY14-18
Apr'15
tearline
SoS Quarterly Summary Report Jan to Mar 2015 - April 2015
Submitted by awhitesell on Fri, 04/10/2015 - 4:41pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UIUC
A Hypothesis Testing Framework for Network Security
Data Driven Security Models and Analysis
Data-Driven Model-Based Decision-Making
Science of Human Circumvention of Security
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
FY14-18
Apr'15
tearline
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems - April 2015
Submitted by awhitesell on Fri, 04/10/2015 - 4:30pm
Approved by NSA
Scalability and Composability
Metrics
UIUC
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
FY14-18
Apr'15
tearline
Data Driven Security Models and Analysis - April 2015
Submitted by awhitesell on Fri, 04/10/2015 - 4:11pm
Approved by NSA
Metrics
Resilient Architectures
Human Behavior
UIUC
Data Driven Security Models and Analysis
FY14-18
Apr'15
« first
‹ previous
1
2
3
4
5
next ›
last »