| Reliability Analysis with Dynamic Reliability Block Diagrams in the Mobius Modeling Tool.pdf |
|
| 070214 Quarterly Meeting Sanders Slides.pdf |
|
| Keefe ADVISE.pdf |
|
| 022015 Bi-weekly Presentation Noureddine.pdf |
|
| 040315 Biweekly Presentation Noureddine.pdf |
|
| 10202015 Noureddine Slides |
|
| 07 SoS Quarterly Meeting July2016 Sanders |
|
| Game Theory with Learning for Cyber Security Monitoring |
|
| A Framework for Generation Replay and Analysis of Real-World Attack Variants |
|
| Safety-Critical Cyber-Physical Attacks Analysis Detection and Mitigation |
|
| Iyer NSA mtg UMD System Resiliency nov 2014 |
|
| preemptive intrusion detection |
|
| Tutorial 5 Kalbarczyk Resilient Architectures |
|
| Estrada EDCC 2015 Slides.pdf |
|
| 10062015 Eric Badger Slides.pdf |
|
| 05032016 Cao |
|
| 16 SoS Quarterly Meeting July 2016 Iyer |
|
| 09282016 Chung.pdf |
|
| Characterizing Smartphone Usage Patterns from Millions of Android Users.pdf |
|
| The Healthtech Declaration.pdf |
|
| Preliminary Analysis of Code Hunt Data Set from a Contest |
|
| Automated Test Input Generation for Android Are we Really There Yet in an Industrial Case |
|
| AppContext Differentiating Malicious and Benign Mobile App Behaviors Using Context Slides |
|
| Tutorial 2 Smith Blythe Human Behavior.pdf |
|
| SLIDES Circumvention 7-14-15.pdf |
|