Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
documentation
biblio
Classification of Websites Based on the Content and Features of Sites in Onion Space
Submitted by grigby1 on Fri, 01/15/2021 - 12:23pm
feedback
website classification
Tor
text analysis methods
site features
site content
parsing sites
onion-sites
onion space
onion site classification
features of onion sites
Dark Net
categories of onion sites
analysis of onion sites
Human Factors
dark web
learning (artificial intelligence)
neural network training
Python
Uniform resource locators
Electronic mail
documentation
Web sites
feature extraction
neural nets
pattern classification
internet
Human behavior
pubcrawl
Neural networks
machine learning
Training
biblio
Requirements Patterns Structure for Specifying and Reusing Software Product Line Requirements
Submitted by aekwall on Mon, 11/09/2020 - 1:14pm
requirement engineering activities
Information Reuse and Security
SRP structure
SPLE
software requirement pattern structure
software product lines
software product line requirements
Software Product Line Engineering
software development phases
software artifacts
Requirements Reuse
requirements patterns structure
Requirements Patterns
security
RePa requirements pattern template
systems analysis
documentation
Systematics
formal verification
Compositionality
Proposals
Formal Specification
Unified modeling language
pubcrawl
Resiliency
Software
biblio
E-Government - Qualified Digital Signature Case Study
Submitted by grigby1 on Fri, 10/16/2020 - 11:14am
institutional websites
Web sites
security
Resiliency
resilience
qualified digital signature case
Qualified Digital Signature
pubcrawl
Portable document format
policy-based governance
Leiria
Law
Instruments
Autenticity
Human behavior
government data processing
Germanium
Electronic government
E-Government
documentation
digital signatures
digital format
Cybersecurity
computer application
collaboration
biblio
What Do Developers Discuss about Biometric APIs?
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
Market research
application programming interface
system developers
sound biometric system
Neurotechnology
multiple implementation environments
Empirical Software Engineering
biometrics
biometric-based algorithms
biometric technology
biometric API-related posts
APIs misuse
Face
pubcrawl
Sorting
documentation
feature extraction
Compositionality
Task Analysis
biometrics (access control)
application program interfaces
APIs
Software
Resiliency
resilience
biblio
Experience Report: How to Extract Security Protocols' Specifications from C Libraries
Submitted by grigby1 on Fri, 04/24/2020 - 4:20pm
object-oriented languages
tools
Task Analysis
Software
security protocols
security protocol specifications
security of data
security
reverse engineering
Resiliency
resilience
pubcrawl
Protocols
object-oriented programming
automatic tools
object oriented security
Metrics
Libraries
human-dependent approach
formal verification
Formal Specification
formal model
extract security protocols
documentation
composability
codelevel reverse engineering
C programming language
C libraries
biblio
ICS/SCADA Device Recognition: A Hybrid Communication-Patterns and Passive-Fingerprinting Approach
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
documentation
computerised monitoring
industrial control
industrial control system
SCADA Systems Security
Compositionality
TCPIP
defense augmentation
Device recognition
Object recognition
hybrid communication-patterns
ICS/SCADA device recognition
Industrial Control Systems
legacy ICS/SCADA systems
network data fingerprinting
passive-fingerprinting
SCADA fingerprinting
security of data
software maintenance
security vulnerabilities
Python
production engineering computing
Databases
pubcrawl
Human behavior
Resiliency
cyber-physical systems
supervisory control and data acquisition systems
SCADA systems
mobile computing
Protocols
security
Internet of Things
biblio
Comparing the Usability of Cryptographic APIs
Submitted by K_Hooper on Wed, 05/09/2018 - 11:00am
GitHub
Usable Security
usability
symmetric cryptography
software libraries
Security by Default
Scalability
Resiliency
Python developers
pubcrawl
programming
Libraries
Guidelines
API usability
documentation accessibility
documentation
cryptography errors
Cryptography
cryptographic library
cryptographic application programming interfaces
cryptographic API usability
controlled experiment
code security
auxiliary features
application program interfaces
biblio
Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
safety requirements
Unified modeling language
standards
software assurance
security-critical systems
security requirements
security of data
security management
Security Assurance
security
Scalability
Safety-Critical Systems
safety-critical software
certification
Safety management
safety assurance
Safety
requirements engineering
pubcrawl
integrated computational-physical capabilities
formal verification
documentation
cyber-physical systems
Context modeling
composability
compliance assurance
biblio
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns
Submitted by Katie Dey on Fri, 10/24/2014 - 12:52pm
Science of Security
Patterns
taxonomy
software reusability
Software
security patterns
security of data
security knowledge
security
Science of Security
requirements engineering pattern
requirements engineering
psychology
abstraction
patternmining
Pattern recognition
pattern experimentation
object-oriented methods
Natural languages
knowledge reuse
information security guidelines
formal verification
documentation
cognitive psychology
CMU
CMU
« first
‹ previous
1
2