![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[ ]](/icons/unknown.gif) | 01_coordinated_attacks_manets_at_CERIAS[5]-6.ppt | 2020-07-30 20:28 | 835K | |
![[ ]](/icons/unknown.gif) | 02_Intro_to_Trust.ppt | 2020-07-30 20:28 | 251K | |
![[ ]](/icons/unknown.gif) | 03_Trading_Privacy_for_Trust.ppt | 2020-07-30 20:28 | 403K | |
![[ ]](/icons/unknown.gif) | 04_Privacy_preserving_data_dissemination.ppt | 2020-07-30 20:28 | 889K | |
![[ ]](/icons/unknown.gif) | 05_Detecting_service_violations_and_intruders.ppt | 2020-07-30 20:28 | 1.7M | |
![[ ]](/icons/unknown.gif) | 06_Peer_to_Peer_trusted_communication.ppt | 2020-07-30 20:28 | 270K | |
![[ ]](/icons/layout.gif) | 07_NGC-Data_Leakage_and_Moving_Target_Defense.pdf | 2020-07-30 20:28 | 2.1M | |
![[ ]](/icons/unknown.gif) | 08_Adversarial_ML.pptx | 2020-07-30 20:28 | 8.1M | |
![[ ]](/icons/unknown.gif) | 09_IAS-Intelligent_Autonomous-Secure-Systems.pptx | 2020-07-30 20:28 | 29M | |
![[ ]](/icons/layout.gif) | 10_Lalana-Explanations_of_IAS.pdf | 2020-07-30 20:28 | 165K | |
![[ ]](/icons/unknown.gif) | 11_Adversarial_Machine_Learning-IARPA.pptx | 2020-07-30 20:28 | 371K | |
![[ ]](/icons/unknown.gif) | 12_Attacks_in_Networks.docx | 2020-07-30 20:28 | 18K | |
![[ ]](/icons/unknown.gif) | 13_Nathalie-Baracaldo-attacks-AI-ML.docx | 2020-08-05 18:59 | 291K | |
![[ ]](/icons/unknown.gif) | 14_Darpa-meeting-Learning_Machines-Sept-10-short-version.pptx | 2020-07-30 20:28 | 261K | |
![[ ]](/icons/layout.gif) | 15_Secure-Resilient_systems_and_provenance.pdf | 2020-07-30 20:28 | 2.1M | |
![[ ]](/icons/layout.gif) | 16_Nathalie-Baracaldo_ICIOT-IBM.pdf | 2020-07-30 20:28 | 506K | |
![[ ]](/icons/layout.gif) | 17_Canada-Clement-Mitigating_Learning_attacks.pdf | 2020-07-30 20:28 | 820K | |
![[ ]](/icons/unknown.gif) | 18_Lilien-Towards_Measuring_Sec_Priv_via_Serv_Mech.pptx | 2020-07-30 20:28 | 522K | |
![[ ]](/icons/unknown.gif) | 19_JPL-Bhargava-IAS-Slides-June_26th.pptx | 2020-07-30 20:28 | 2.2M | |
![[ ]](/icons/layout.gif) | 20_nathalie-Mitigating_Poisoning_Attacks_on_Machine_Learning_Models_A_Data_Provenance_Based_Approach.pdf | 2020-07-30 20:28 | 1.2M | |
![[ ]](/icons/unknown.gif) | 21_Switzerland-Conference-Bhargava-IAS.pptx | 2020-07-30 20:28 | 930K | |
![[ ]](/icons/unknown.gif) | 22_NSF-SELF-Healing-proposal-summary.docx | 2020-07-30 20:28 | 39K | |
![[ ]](/icons/layout.gif) | 23_Vienna-cognitive-autonomy-report-2016.pdf | 2020-07-30 20:28 | 741K | |
![[ ]](/icons/unknown.gif) | 24_STC_Schedule.docx | 2020-07-30 20:28 | 140K | |
![[ ]](/icons/unknown.gif) | 25_Intro_to_privacy.ppt | 2020-07-30 20:28 | 402K | |
![[ ]](/icons/unknown.gif) | 26_Intro_to_security.ppt | 2020-07-30 20:28 | 328K | |
![[ ]](/icons/unknown.gif) | 27_Privacy_and_Identity_Managemnet_in_Cloud.ppt | 2020-07-30 20:28 | 694K | |
![[ ]](/icons/unknown.gif) | 28_Security-Privacy-in_Cloud.ppt | 2020-07-30 20:28 | 395K | |
![[ ]](/icons/layout.gif) | 29_Privacy_in_Off-Loading_in_Cloud.pdf | 2020-07-30 20:28 | 1.7M | |
![[ ]](/icons/layout.gif) | 30_Measuring_Attack-Path_complexity.pdf | 2020-07-30 20:28 | 341K | |
![[ ]](/icons/layout.gif) | 31_End_to_End_Security_in_Service-Oriented_Architecture.pdf | 2020-07-30 20:28 | 1.3M | |
![[ ]](/icons/layout.gif) | 32_Privacy_Preservation_in_Cloud-IEEE-Cloud_conf.pdf | 2020-07-30 20:28 | 1.2M | |
![[ ]](/icons/unknown.gif) | 33_Attacks_on_Networks-List.docx | 2020-07-30 20:28 | 18K | |
![[ ]](/icons/layout.gif) | 34_Moving_Target_Defense-ieee_cloud2017.pdf | 2020-07-30 20:28 | 1.5M | |
![[ ]](/icons/unknown.gif) | 35_Defending_against_Collaborative_Attacks_in_Manet.doc | 2020-07-30 20:28 | 88K | |
![[ ]](/icons/unknown.gif) | 36_useful_slide_animation_form_last_NGC-Meeting.ppt | 2020-07-30 20:28 | 606K | |
![[ ]](/icons/unknown.gif) | 37_Data_Dissemination_in-UAV-slides.pptx | 2020-07-30 20:28 | 1.7M | |
![[ ]](/icons/unknown.gif) | 38_SOA_security-Filetring.pptx | 2020-07-30 20:28 | 1.2M | |
![[ ]](/icons/unknown.gif) | 39_CERT-Attacks-Models.doc | 2020-07-30 20:28 | 32K | |
![[ ]](/icons/layout.gif) | 40_CERT-Greg-Shanon-CMU.pdf | 2020-07-30 20:28 | 1.9M | |
![[ ]](/icons/layout.gif) | 41_IEEE-TKDE-ExtendingAttackGraph.pdf | 2020-07-30 20:28 | 560K | |
![[ ]](/icons/unknown.gif) | 42_week13_lecture1-Privacy-Trust-2.ppt | 2020-07-30 20:28 | 384K | |
![[ ]](/icons/unknown.gif) | 43_coordinated_attacks_manets_at_CERIAS.ppt | 2020-07-30 20:28 | 835K | |
![[ ]](/icons/unknown.gif) | 44_Secure-data-warehouse.ppt | 2020-07-30 20:28 | 169K | |
![[ ]](/icons/unknown.gif) | 45_Adaptable_Service_composition-NGC-report.pptx | 2020-07-30 20:28 | 1.8M | |
![[ ]](/icons/unknown.gif) | 46_Denis-CLD251-Blockhub-Rel-July 4.pptx | 2020-07-30 20:23 | 758K | |
![[ ]](/icons/unknown.gif) | 46_Denis-CLD251-Blockhub-Rel-July_4.pptx | 2020-07-30 20:28 | 758K | |
![[ ]](/icons/unknown.gif) | 47_Adaptable_Defense-Collaborative_attacks_in_SOA.ppt | 2020-07-30 20:28 | 336K | |
![[ ]](/icons/unknown.gif) | 48_Collaborative_attacks-Wang-slide.pptx | 2020-07-30 20:28 | 218K | |
![[ ]](/icons/unknown.gif) | 49_Data-Dissemination_and_Evaporation.ppt | 2020-07-30 20:28 | 2.4M | |
![[ ]](/icons/unknown.gif) | 50_Wang-Collaborative_attacks_and_More.pptx | 2020-07-30 20:28 | 8.6M | |
![[ ]](/icons/unknown.gif) | 51_Wang-Trusted Router Coll Attacks-and REACT-slides.pptx | 2020-07-30 20:22 | 114K | |
![[ ]](/icons/unknown.gif) | 51_Wang-Trusted_Router_Coll_Attacks-and_REACT-slides.pptx | 2020-07-30 20:28 | 114K | |
![[ ]](/icons/unknown.gif) | 20200805_Nathalie-Baracaldo-attacks-AI-ML.docx | 2020-08-05 19:00 | 291K | |
![[ ]](/icons/unknown.gif) | Adaptable DEfense-Collaborative attacks in SOA.ppt | 2020-07-29 18:35 | 336K | |
![[ ]](/icons/unknown.gif) | Adaptable Service composition-NGC-report.pptx | 2020-07-29 18:35 | 1.8M | |
![[ ]](/icons/unknown.gif) | Adversarial ML.pptx | 2020-07-29 18:35 | 8.1M | |
![[ ]](/icons/unknown.gif) | Adversarial Machine Learning-IARPA.pptx | 2020-07-29 18:35 | 371K | |
![[ ]](/icons/unknown.gif) | Attacks in Networks.docx | 2020-07-29 18:35 | 18K | |
![[ ]](/icons/unknown.gif) | Attacks on Networks-List.docx | 2020-07-29 18:35 | 18K | |
![[ ]](/icons/unknown.gif) | CERT-Attacks-Models.doc | 2020-07-29 18:35 | 32K | |
![[ ]](/icons/layout.gif) | CERT-Greg-Shanon-CMU.pdf | 2020-07-29 18:35 | 1.9M | |
![[ ]](/icons/layout.gif) | Canada-Clement-Mitigating Learning attacks.pdf | 2020-07-29 18:35 | 820K | |
![[ ]](/icons/unknown.gif) | Collaboartive attacks-Wang-slide.pptx | 2020-07-29 18:35 | 218K | |
![[ ]](/icons/unknown.gif) | Darpa-meeting-Learning Machines-Sept-10-short-version.pptx | 2020-07-29 18:35 | 261K | |
![[ ]](/icons/unknown.gif) | Data-Dissemination and Evaporation.ppt | 2020-07-29 18:35 | 2.4M | |
![[ ]](/icons/unknown.gif) | Data Dissemination in-UAV-slides.pptx | 2020-07-29 18:35 | 1.7M | |
![[ ]](/icons/unknown.gif) | Defending against Collaboartive Aattacks in Manet.doc | 2020-07-29 18:35 | 88K | |
![[ ]](/icons/unknown.gif) | Denis-CLD251-Blockhub-Rel-July 4.pptx | 2020-07-29 18:35 | 758K | |
![[ ]](/icons/unknown.gif) | Detecting service voilations and intruders.ppt | 2020-07-29 18:35 | 1.7M | |
![[ ]](/icons/layout.gif) | End to End Security in Service-Oriented Architecture.pdf | 2020-07-29 18:35 | 1.3M | |
![[ ]](/icons/unknown.gif) | IAS-Intelligent Autonomous-Secure-Systems.pptx | 2020-07-29 18:36 | 29M | |
![[ ]](/icons/layout.gif) | IEEE-TKDE-ExtendingAttackGraph.pdf | 2020-07-29 18:36 | 560K | |
![[ ]](/icons/unknown.gif) | Intro to Trust.ppt | 2020-07-29 18:36 | 251K | |
![[ ]](/icons/unknown.gif) | Intro to privacy.ppt | 2020-07-29 18:36 | 402K | |
![[ ]](/icons/unknown.gif) | Intro to security.ppt | 2020-07-29 18:36 | 328K | |
![[ ]](/icons/unknown.gif) | JPL-Bhargava-IAS-Slides-June 26th.pptx | 2020-07-29 18:36 | 2.2M | |
![[ ]](/icons/layout.gif) | Lalana-Explainations of IAS.pdf | 2020-07-29 18:36 | 165K | |
![[ ]](/icons/unknown.gif) | Lilien-Towards Measuring Sec Priv via Serv Mech.pptx | 2020-07-29 18:36 | 522K | |
![[ ]](/icons/layout.gif) | Measuring Attack-Path complexity.pdf | 2020-07-29 18:36 | 341K | |
![[ ]](/icons/layout.gif) | Moving Target Defense-ieee_cloud2017.pdf | 2020-07-29 18:36 | 1.5M | |
![[ ]](/icons/layout.gif) | NGC-Data Leakage and Moving Target Defense.pdf | 2020-07-29 18:36 | 2.1M | |
![[ ]](/icons/unknown.gif) | NGC_TechFest_Front_slides-3.pptx | 2020-07-30 15:11 | 2.5M | |
![[ ]](/icons/unknown.gif) | NSF-SELF-Healing-proposal-summary.docx | 2020-07-29 18:36 | 39K | |
![[ ]](/icons/unknown.gif) | Nathalie-Baracaldo-attacks-AI-ML.docx | 2020-07-29 18:36 | 291K | |
![[ ]](/icons/layout.gif) | Nathalie-Baracaldo_ICIOT-IBM.pdf | 2020-07-29 18:36 | 506K | |
![[ ]](/icons/unknown.gif) | Peer to Peer trusted communication.ppt | 2020-07-29 18:36 | 270K | |
![[ ]](/icons/layout.gif) | Privacy Preservation in Cloud-IEEE-Cloud conf.pdf | 2020-07-29 18:36 | 1.2M | |
![[ ]](/icons/unknown.gif) | Privacy and Identity Managemnet in Cloud.ppt | 2020-07-29 18:36 | 694K | |
![[ ]](/icons/layout.gif) | Privacy in Off-Loading in Cloud.pdf | 2020-07-29 18:36 | 1.7M | |
![[ ]](/icons/unknown.gif) | Privacy preserving data dissemination.ppt | 2020-07-29 18:36 | 889K | |
![[ ]](/icons/unknown.gif) | SOA security-Filetring.pptx | 2020-07-29 18:36 | 1.2M | |
![[ ]](/icons/unknown.gif) | STC_Schedule.docx | 2020-07-29 18:36 | 140K | |
![[ ]](/icons/layout.gif) | Secure-Resilient systems and provenance.pdf | 2020-07-29 18:36 | 2.1M | |
![[ ]](/icons/unknown.gif) | Secure-data-warehouse.ppt | 2020-07-29 18:36 | 169K | |
![[ ]](/icons/unknown.gif) | Switzerland-Conference -Bhargava-IAS.pptx | 2020-07-29 18:36 | 930K | |
![[ ]](/icons/unknown.gif) | Trading Privacy for Trust.ppt | 2020-07-29 18:36 | 403K | |
![[ ]](/icons/layout.gif) | Vienna-cognitive-autonomy-report-2016.pdf | 2020-07-29 18:36 | 741K | |
![[ ]](/icons/unknown.gif) | Wang-Collaboartive attacks and More.pptx | 2020-07-29 18:36 | 8.6M | |
![[ ]](/icons/unknown.gif) | Wang-Trusted Router Coll Attacks-and REACT-slides.pptx | 2020-07-29 18:36 | 114K | |
![[ ]](/icons/unknown.gif) | X_Security-Privacy-in Cloud.ppt | 2020-07-29 18:36 | 395K | |
![[ ]](/icons/unknown.gif) | coordinated_attacks_manets_at_CERIAS.ppt | 2020-07-29 18:36 | 835K | |
![[ ]](/icons/unknown.gif) | coordinated_attacks_manets_at_CERIAS[5]-6.ppt | 2020-07-29 18:36 | 835K | |
![[ ]](/icons/layout.gif) | nathalie-Mitigating Poisoning Attacks on Machine Learning Models- A Data Provenance Based Approach.pdf | 2020-07-29 18:36 | 1.2M | |
![[TXT]](/icons/text.gif) | nit.html | 2020-08-11 22:28 | 17K | |
![[ ]](/icons/unknown.gif) | useful slide annimation form last NGC-Meeting.ppt | 2020-07-29 18:36 | 606K | |
![[ ]](/icons/unknown.gif) | week13_lecture1-Privacy-Trust-2.ppt | 2020-07-29 18:36 | 384K | |
![[ ]](/icons/unknown.gif) | ~$C_Schedule.docx | 2020-07-29 18:36 | 162 | |
![[ ]](/icons/unknown.gif) | ~$coordinated_attacks_manets_at_CERIAS[5]-6.ppt | 2020-07-29 18:36 | 165 | |
|