Recent NSF Research Grants 2012-2013

Image removed.

 

  • Capturing People's Expectations of Privacy with Mobile Apps by Combining Automated Scanning and Crowdsourcing Technique (ID#:14-1128)
    • Carnegie-Mellon University
    • Date: 09/01/2012
  • Inference and Checking of Context-sensitive Pluggable Types (ID#:14-1129)
    • Rensselaer Polytechnic Institute
    • Date: 09/01/2013
  • Cybercrime Susceptibility in the Sociotechnical System: Exploration of Integrated Micro- and Macro-Level Sociotechnical Models of Cybersecurity (ID#:14-1130)
    • University of Miami
    • Date: 10/01/2013
  • Sonifying Cyber-Security Cues for Internet Users Who Are Visually Impaired (ID#:14-1131)
    • Texas Tech University
    • Date: 09/01/2013
  • Securing Python Package Management with The Update Framework (TUF) (ID#:14-1132)
    • New York University
    • Date: 08/01/2013
  • Caging Libraries To Control Software Faults (ID#:14-1133)
    • New York University
    • Date: 09/01/2012
  • PROTEUS: A Practical and Rigorous Toolkit for Privacy (ID#:14-1134)
    • Duke University
    • Date: 02/01/2013
  • Formal Models of Human Control and Interaction with Cyber-Physical Systems (ID#:14-1135)
    • University of New Mexico
    • Date: 09/15/2013
  • Cost-Competitve Analysis - A New Tool for Designing Secure Systems (ID#:14-1136)
    • University of New Mexico
    • Date: 10/01/2013
  • Practical Capabilities and Least Authority for Virtualized Environments (ID#:14-1137)
    • University of Utah
    • Date: 10/01/2013
  • Novel Imaging Approaches for the Detection of Counterfeit ICs (ID#:14-1138)
    • University of Connecticut
    • Date: 10/01/2013
  • Securing Mobile Cyber-Physical Systems (CPSs) Against Stealthy Attacks (ID#:14-1139)
    • Texas State University - San Marcos
    • Date: 01/15/2012
  • Toward Trusted Third-Party Microprocessor Cores: A Proof Carrying Code Approach (ID#:14-1140)
    • University of Central Florida
    • Date: 10/01/2013
  • Wireless Network Security: Building on Erasures (ID#:14-1141)
    • University of California-Los Angeles
    • Date: 09/01/2013
  • Measurement and Analysis Techniques for Internet Freedom on IP and Social Networks (ID#:14-1142)
    • University of New Mexico
    • Date: 07/15/2013
  • Enhancing Undergraduate Experience in Mobile Computing Security (ID#:14-1143)
    • Indiana University
    • Date: 06/01/2013
  • Towards Securing Coupled Financial and Power Systems in the Next Generation Smart Grid (ID#:14-1144)
    • Pennsylvania State Univ University Park
    • Date: 09/01/2012
  • SDR Shield: A Hardware-based Security Solution for Software Defined Radio (ID#:14-1145)
    • Virginia Polytechnic Institute and State University
    • Date: 09/01/2012
  • Authenticated Ciphers (ID#:14-1146)
    • George Mason University
    • Date: 10/01/2013
 
  • Automatic Software Model Repair for Security Policies (ID#:14-1147)
    • Michigan State University
    • Date: 09/01/2013
  • An Evolutionary-Inspired Approach for Moving Target Defenses (ID#:14-1148)
    • Wake Forest University
    • Date: 10/01/2012

Note:

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.