Reliability Analysis with Dynamic Reliability Block Diagrams in the Mobius Modeling Tool.pdf |
|
070214 Quarterly Meeting Sanders Slides.pdf |
|
Keefe ADVISE.pdf |
|
022015 Bi-weekly Presentation Noureddine.pdf |
|
040315 Biweekly Presentation Noureddine.pdf |
|
10202015 Noureddine Slides |
|
07 SoS Quarterly Meeting July2016 Sanders |
|
Game Theory with Learning for Cyber Security Monitoring |
|
A Framework for Generation Replay and Analysis of Real-World Attack Variants |
|
Safety-Critical Cyber-Physical Attacks Analysis Detection and Mitigation |
|
Iyer NSA mtg UMD System Resiliency nov 2014 |
|
preemptive intrusion detection |
|
Tutorial 5 Kalbarczyk Resilient Architectures |
|
Estrada EDCC 2015 Slides.pdf |
|
10062015 Eric Badger Slides.pdf |
|
05032016 Cao |
|
16 SoS Quarterly Meeting July 2016 Iyer |
|
09282016 Chung.pdf |
|
Characterizing Smartphone Usage Patterns from Millions of Android Users.pdf |
|
The Healthtech Declaration.pdf |
|
Preliminary Analysis of Code Hunt Data Set from a Contest |
|
Automated Test Input Generation for Android Are we Really There Yet in an Industrial Case |
|
AppContext Differentiating Malicious and Benign Mobile App Behaviors Using Context Slides |
|
Tutorial 2 Smith Blythe Human Behavior.pdf |
|
SLIDES Circumvention 7-14-15.pdf |
|