Verification of Hyperproperties |
|
Trustworthy and Composable Software Systems with Contracts |
|
Empirical Models for Vulnerabilities and Attacks |
|
Human Behavior and Cyber Vulnerabilities |
|
Does the Presence of Honest Users Affect Intruder Behavior? |
|
User-Centered Design for Security |
|
Understanding Developers' Reasoning about Privacy and Security |
|
Trust, Recommendation Systems, and Collaboration |
|
Reasoning about Protocols with Human Participants |
|
Lablet Summaries UMD.pdf |
|