Skip to main content
Science of Security Virtual Organization

Header Menu

  • Research
    • Virtual Institutes
    • Lablets
    • Projects
    • Publications
  • HotSoS
  • Competitions
    • Cybersecurity Paper Competition
    • ISEF
  • Conferences
    • HCSS
    • HotSoS
    • C3E
Not a member? Forgot your password?

Hamburger Menu

  • Home
  • Projects
  • News
  • Events

Breadcrumb

  • Home /
  • Katie Dey /
  • User Contributions
Title Date
How Bad It It Really? An Analysis of Severity Scores for Vulnerabilities 2018-03-18
Using Object Capabilities and Effects to Build an Authority-Safe Module System 2018-03-18
Quantifying the Security Effectiveness of Network Diversity 2018-03-18
Toward Extraction of Security Requirements From Text 2018-03-18
Understanding Privacy Concerns of WhatsApp Users in India 2018-03-18
Cryptography in a Post-Quantum World 2018-03-18
Indirect Cyber Attacks by Perturbation of Environment Control: a Data-Driven Attack Model 2018-03-18
An Expert-based Bibliometric for a Science of Security 2018-03-18
Hourglass-shaped Architecture for Model-based Development of Safe and Secure Cyber-physical Systems 2018-03-18
Investigating Tensorflow for Airport Facial Identification 2018-03-18
Ethics, Values, and Personal Agents 2018-03-18
What Proportion of Vulnerabilities Can Be Attributed to Ordinary Coding Errors? 2018-03-18
Quantitative Underpinnings of Secure Graceful Degradation 2018-03-18
A Comparative Analysis of Manual Methods for Analyzing Security Requirements in Regulatory Documents 2018-03-18
Integrating Historical and Real-Time Anomaly Detection to Create a More Resilient Smart Grid Architecture 2018-03-18
Detecting Monitor Compromise Using Evidential Reasoning 2018-03-18

Pagination

  • First page « First
  • Previous page ‹‹
  • …
  • Page 16
  • Page 17
  • Page 18
  • Page 19
  • Current page 20
  • Page 21
  • Page 22
  • Page 23
  • Page 24
  • …
  • Next page ››
  • Last page Last »
© 2025 Science of Security Virtual Organization

Footer

  • Terms
  • Follow Us on X