Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software quality
biblio
Learning to Identify Security-Related Issues Using Convolutional Neural Networks
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
open source issues
Semantics
user interfaces
agile development practices
aid development teams
CNN
high dimensional word embeddings
issue descriptions
Man-machine systems
natural language descriptions
security issues
robust security assurance
SDL
security-focused automation
security-related content
security-related requirements
software products
two-phase neural net architecture
vulnerability descriptions
software assurance
convolutional neural network
security
Kernel
computer architecture
learning (artificial intelligence)
pubcrawl
composability
deep learning
Databases
convolutional neural nets
security of data
Companies
ontologies (artificial intelligence)
Data mining
public domain software
software security
Scalability
software quality
Human Factors
biblio
A Comparative Analysis of Static Code Analysis Tools That Check Java Code Adherence to Java Coding Standards
Submitted by grigby1 on Mon, 02/10/2020 - 11:34am
Java programming language
testing
style
static code analysis tool
static code analysis
static analysis
standards
software quality
software maintenance
software development
Resiliency
resilience
quality
pubcrawl
program diagnostics
JPL Coding Standards
Concurrency
Java Coding Standards Enforcing Tools
Java code analysis
Java code adherence
Java
International Java Coding Standards
Human behavior
exceptions
critical system
concurrency (computers)
composability
Comparative Analysis
Coding Standard Analyzers
analyzers
security
biblio
Process trees amp; service chains can serve us to mitigate zero day attacks better
Submitted by aekwall on Mon, 01/20/2020 - 12:04pm
sales team
buggy software
complete threat canvas
Computer graphics
data protection systems
Data Visualization techniques
exponential evolution
front-end sophistication domain
human computer interactions
network threats
process trees
attack sophistication
service chains
software professionals
software quality metrics
time 0.0 d
Unique Selling Proposition
user friendly applications
users
USP
zero day threats
Zero Day Attacks and Defense
cyber security
invasive software
operating system
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
standards
tools
computer security
Software
human computer interaction
Data visualization
data visualisation
software quality
operating systems (computers)
Predictive Metrics
cyber domain
Zero day attacks
application frameworks
biblio
Cross-Entropy: A New Metric for Software Defect Prediction
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
pubcrawl
Task Analysis
source code (software)
source code
software repository
software quality assurance
software quality
software metrics
software defect prediction
software bugs
Software
Semantics
recurrent neural network language model
recurrent neural nets
code metric
program debugging
predictive security metrics
Predictive models
natural language processing
Metrics
Measurement
language model
Entropy
DefectLearner
deep learning
cross-entropy
Computer bugs
code naturalness
biblio
Cross-Release Code Churn Impact on Effort-Aware Software Defect Prediction
Submitted by grigby1 on Thu, 09/26/2019 - 10:25am
open-source projects
standards
software quality
software metrics
software defect prediction
Safe Coding
Resiliency
resilience
regression analysis
public domain software
pubcrawl
Predictive models
Pop effort aware measure
policy-based governance
AUC
Open Source Software
Metrics
Measurement
Human Factors
Human behavior
GM
effort-aware software defect prediction
design metrics
cross-release code churn impact
Cross-release code churn
Correlation
complex systems
collaboration
biblio
A Position Study to Investigate Technical Debt Associated with Security Weaknesses
Submitted by aekwall on Mon, 08/26/2019 - 10:06am
common weakness scoring system
security of data
security
Software
Software measurement
Human behavior
pubcrawl
policy-based governance
Metrics
tools
Companies
static analysis
software development management
catching vulnerabilities
Common Weakness Enumeration
resilience
CWSS scores
decidedly negative impacts
design level CWE
exploitable weaknesses
five-step approach
potential security breaches
quality assurance
Quamoco quality model
scoring mechanism
security weaknesses
software lifecycle
software quality
TD
technical debt
biblio
Is Predicting Software Security Bugs Using Deep Learning Better Than the Traditional Machine Learning Algorithms?
Submitted by aekwall on Mon, 07/01/2019 - 10:14am
Predictive models
Support vector machines
software security bugs
software quality metrics
software quality
software metrics
software insecurity
Software
security-related bugs
security of data
Security Metrics
security breaches
security
Random Forest
pubcrawl
program debugging
predictive security metrics
Naive Bayes
multilayer deep feedforward network
Metrics
machine learning
learning (artificial intelligence)
feedforward neural nets
Feedforward Artificial Network
deep learning technique
deep learning
Decision trees
Decision Tree
Computer bugs
Bug Propensity Correlational Analysis
Bayes methods
biblio
An Approach for Trustworthiness Benchmarking Using Software Metrics
Submitted by aekwall on Mon, 07/01/2019 - 10:12am
Security Metrics
trustworthiness benchmarking
trustworthiness assessment model
Trusted Computing
Software systems
software security experts
software quality
software metrics
security vulnerabilities
security of data
Measurement
security attributes
security
pubcrawl
Mozilla Firefox project
Metrics
Buildings
Benchmark testing
metrics testing
biblio
A Proposal for a New Way of Classifying Network Security Metrics: Study of the Information Collected through a Honeypot
Submitted by aekwall on Mon, 07/01/2019 - 10:11am
network security
vulnerable server
time 19.0 month
statistical analysis
SSH honeypot-based system
software reliability
software quality
Security Metrics
security
pubcrawl
network security metric classification
attacker behaviour evaluation
Metrics
metric
Kippo
information collection
IDS
honeypot
file servers
Data collection
Conferences
computer network security
biblio
Detecting the Use of Unsafe Data in Software of Embedded Systems by Means of Static Analysis Methodology
Submitted by grigby1 on Fri, 02/22/2019 - 4:10pm
pubcrawl
unsafe data
Syntactics
syntactic information
static program code analysis
static code analysis
static analysis methodology
static analysis
software quality
Semantics
semantic information
Resiliency
composability
program diagnostics
program code
potentially unsafe data
Indexes
increase of efficiency
Human behavior
embedded systems
embedded computing
diagnostic rules
Containers
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »