Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software
biblio
Mining Learner-friendly Security Patterns from Huge Published Histories of Software Applications for an Intelligent Tutoring System in Secure Coding
Submitted by grigby1 on Wed, 06/08/2022 - 12:54pm
intelligent tutoring systems
Vulnerability
Training
Software
Scalability
Resiliency
resilience
pubcrawl
Prototypes
Knowledge Discovery
expert systems
intelligent data
Explainable Knowledege
encoding
Comprehensibility
Compositionality
Big Data in Software Engineering
Big Data
association rules
security
biblio
Developing Visualisations to Enhance an Insider Threat Product: A Case Study
Submitted by grigby1 on Tue, 06/07/2022 - 10:09am
Data visualization
Usability in security and privacy
interactive systems
Human and Societal Aspects of Security and Privacy
visual analytics
Visualization application domains
security and privacy
human-centered computing
Refining
insider threat
pubcrawl
visualization
Metrics
composability
Prototypes
privacy
Software
policy-based governance
Human behavior
biblio
Foraging-Theoretic Tool Composition: An Empirical Study on Vulnerability Discovery
Submitted by grigby1 on Mon, 06/06/2022 - 11:11am
empirical study
vulnerability discovery
tools
tool design patterns
Software
security
pubcrawl
profitability
Information Reuse
Information foraging theory
object oriented security
design science
Design methodology
data science
Costs
Compositionality
codes
Metrics
composability
Resiliency
biblio
vCDS: A Virtualized Cross Domain Solution Architecture
Submitted by grigby1 on Tue, 05/24/2022 - 12:52pm
Cloud Computing
security
pubcrawl
Human behavior
resilience
Resiliency
Software
Hardware
Information Assurance
composability
military communication
Metrics
Compositionality
Trusted Computing
Systems architecture
biblio
Construction of immersive architectural wisdom guiding environment based on virtual reality
Submitted by grigby1 on Mon, 05/23/2022 - 3:02pm
smart environment
wisdom guiding
immersive model
data structure
immersive systems
virtual reality
data analysis
Market research
Solid modeling
pubcrawl
composability
Industries
privacy
Data models
Software
Resiliency
Human Factors
Human behavior
biblio
Performance evaluation method of cyber attack behaviour forecasting based on mitigation
Submitted by grigby1 on Fri, 05/20/2022 - 2:46pm
Metrics
threat mitigation
TTPs
True Positive
cyber-attack behavior
MITRE ATT&ck
Accuracy
cyberattack
forecasting
pubcrawl
convergence
estimation
information and communication technology
performance evaluation
Software
Resiliency
resilience
Human behavior
biblio
Tamper Resistance Functions on Internet of Things Devices
Submitted by aekwall on Thu, 05/19/2022 - 12:42pm
Metrics
Tamper resistance
Secure Boot
Key storage
flash encryption
Esp32
Internet of Things
Resistance
Technological innovation
security
Scalability
pubcrawl
encryption
tools
Human Factors
Software
Hardware
biblio
OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept
Submitted by aekwall on Thu, 05/19/2022 - 12:39pm
Software
pubcrawl
Metrics
composability
Ecosystems
taint analysis
C++ languages
Computer crashes
Proofs-of-Concept
Symbolic Execution
Vulnerability Propagation
biblio
HashMTI: Scalable Mutation-based Taint Inference with Hash Records
Submitted by aekwall on Thu, 05/19/2022 - 12:37pm
Software
Scalability
Conferences
pubcrawl
Metrics
composability
Hash functions
Prototypes
fuzzing
Memory management
taint analysis
program analysis
Software Testing
biblio
SecuCheck: Engineering configurable taint analysis for software developers
Submitted by aekwall on Thu, 05/19/2022 - 12:36pm
composability
Conferences
domain-specific languages
integrated development environment
Java
Metrics
pubcrawl
Runtime
security
Software
static analysis
taint analysis
tools
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »