Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software prototyping
biblio
Harmonizing IT Frameworks and Agile Methods: Challenges and Solutions for the case of COBIT and Scrum
Submitted by grigby1 on Fri, 04/09/2021 - 10:23am
information technologies infrastructure library
solution
software prototyping
software development management
service CMMI
service capability maturity model
Scrum
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
knowledge management
information technology
agile
Information Assurance
independent cases
Human behavior
DP management
digitalization pushes organizations
corresponding previous case study
composability
complex domain
collaboration
COBIT
challenge
Capability maturity model
agile transformation
agile approach
biblio
Attack Surface Identification and Reduction Model Applied in Scrum
Submitted by grigby1 on Fri, 08/28/2020 - 10:50am
security improvement
visualization
visual model
Surface treatment
Software systems
software system
software security vulnerabilities
software prototyping
software engineering
Software
Serum
sensitive data
security of data
attack surface
scrum reduction model
Scalability
Resiliency
resilience
reduction
pubcrawl
Metrics
Identification
Data models
computer security
attack surface identification
biblio
Agile Release Planning Using Natural Language Processing Algorithm
Submitted by aekwall on Mon, 05/18/2020 - 9:54am
agile release planning
word corpus
user story
team working
software prototyping
similar user stories
RV coefficient NLP algorithm
Release Planning
Rally
R Programming
provided user stories
project release
natural language processing algorithm
JIRA
Java utility
complex software engineering projects
Scalability
agile methodology
project management
Algorithm
Currencies
Software algorithms
Java
software development management
software engineering
natural language processing
Planning
pubcrawl
Human behavior
Resiliency
Software
biblio
ACT Testbot and 4S Quality Metrics in XAAS Framework
Submitted by grigby1 on Mon, 03/09/2020 - 1:38pm
software prototyping
metrics reports
program debugging
program testing
pubcrawl
regression testing
security
Security Metrics
security of data
security testing
service models
Software as a service
software metrics
software product
metrics dashboard
software quality
Software Testing
T-Model
test management tools
TestBot
testing
testing as a service
Testing process
testing tools
tools
XaaS (Everything as a Service)
XAAS framework
cloud
metrics testing
4S quality metrics
ACT TestBot tool
agile environment
agile methodology
Auto Bug Logging and Tracking
automated continuous testing
Automatic testing
automation scripts
big data security metrics
bug logging
bug reporting tools
Measurement
cloud based service models
Cloud Computing
Computer bugs
Continuous Delivery
continuous deployment
Continuous Integration
continuous integration tools
Continuous Testing
data analysis
data analytics tools
Measurement and Metrics Texting
Metrics
biblio
Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements
Submitted by grigby1 on Mon, 02/17/2020 - 4:04pm
risk analysis
graph theory
managed assets
Organizations
potential hacking paths
prioritizes surgical requirements
prioritizing Agile Security requirements
process control
pubcrawl
Remediation Requirements
requirements backlog
Requirements Prioritization
graph analytics
risk management
risk-reduction security requirements
Scalability
security
Security Operation Center
security requirements
security scalability
software prototyping
Standards organizations
virtual adversary attack paths
business risks
Agile Security models different types
agile style
attack graph
Attack Path
attack surface
attack surface reduction
Big Data
Big Data Analytics
business data processing
business process targets
business processes
Agile Security
cardinal assets
complex big data graph
Compositionality
Computer crime
constant prioritization
critical assets identification
cyber attack graphs
Cyber Digital Twin
cyber-attacks
data analysis
biblio
Security Testing Based on Attack Patterns
Submitted by BrandonB on Tue, 05/05/2015 - 9:48am
security
Unified modeling language
UML state machine
UML state charts
testing
SQL injection
software prototyping
Software
security testing
security of data
Adaptation models
program testing
model-based testing
internet
HTML
Databases
cross-site scripting
attack patterns
attack pattern
agile software development processes
biblio
State-of-the-Art: A Systematic Literature Review on Agile Information Systems Development
Submitted by BrandonB on Fri, 05/01/2015 - 7:08am
Abstracts
agile information systems development
agile ISD
Data collection
data collection techniques
extreme programming
Interviews
programming
Scrum
software engineering discipline
software prototyping
Systematics
testing