Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software components
biblio
End-to-end security assessment framework for connected vehicles
Submitted by aekwall on Mon, 09/28/2020 - 11:17am
Safety
CPS Privacy
real-time crucial functionalities
hyper-connected world
heterogeneous hardware
end-to-end security assessment framework
complex electronic systems
automotive sector
cloud platforms
connected vehicles
cyber physical systems
software components
user experiences
Human Factors
edge computing
security services
security
Transportation
smart objects
privacy
Cybersecurity
Wireless communication
pubcrawl
Human behavior
cyber-physical systems
Internet of Things (IoT)
Hardware
Cloud Computing
traffic engineering computing
security of data
Automotive engineering
automobiles
biblio
An abstraction layer for cybersecurity context
Submitted by grigby1 on Fri, 05/08/2020 - 1:20pm
Metrics
virtual services
telecommunication security
software components
security-related data
security of data
security context
security appliances
Resiliency
resilience
pubcrawl
object-oriented programming
object oriented security
cloud applications
lightweight inspection
IoT devices
Internet of Things
heterogeneous sources
flexible abstraction layer
enforcement hooks
cybersecurity context
cyber-security frameworks
cyber-attacks
composability
Cloud Computing
biblio
A Systematic Requirements and Risks-Based Test Case Prioritization Using a Fuzzy Expert System
Submitted by aekwall on Mon, 03/09/2020 - 10:16am
requirements risks-based testing
testing
test case prioritization
systematic requirements
software requirements
software engineers
software engineering
software components
Software
Security Risk Estimation
security
Scalability
risk-based approaches
risk information
risk estimation process
Resiliency
False Data Detection
regression testing
regression analysis
pubcrawl
program testing
Metrics
Iron
Human Factors
Human behavior
fuzzy set theory
fuzzy expert systems
fuzzy expert system
Expert Systems and Security
expert systems
estimation
Complexity theory
biblio
Should I Bug You? Identifying Domain Experts in Software Projects Using Code Complexity Metrics
Submitted by grigby1 on Wed, 09/05/2018 - 9:42am
software components
software projects
ownership high
expert identification
domain experts
complex software system
collective code knowledge
code complexity metrics
Computing Theory
object-oriented programming
Complexity theory
Security Metrics
Computer bugs
Companies
Metrics
Couplings
Data mining
software quality
Software
software metrics
Measurement
pubcrawl
biblio
Process-aware side channel monitoring for embedded control system security
Submitted by grigby1 on Fri, 02/02/2018 - 12:17pm
run-time parameters
microcomputers
Monitoring
network connectivity
process stability
process-aware side channel monitoring
pubcrawl
Real-time monitoring
Resiliency
Metrics
security
side channel sensors
side channel sensory modalities
side channels
software components
Temperature measurement
Temperature sensors
thermal
Cryptography
acoustic
analog side channels
composability
computational loop
control logic
control systems
CPS computational nodes
CPS device
actuator security
cyber-attacks
cyber-physical systems
embedded control system security
embedded systems
Fans
feature extraction
heterogeneous hardware
biblio
Securing the supply chain for commodity IT devices by automated scenario generation
Submitted by grigby1 on Wed, 03/08/2017 - 1:28pm
security of data
Hardware
Homeland Security
Microprogramming
nonUS suppliers
operating systems
program analysis
program diagnostics
pubcrawl170112
security
grave vulnerabilities
software components
static program analysis
Supply Chain
supply chain management
supply chain security
supply chains
Theseus
vetting process
component interaction mapping
attack graph generation
attack graph generation algorithms
automated scenario generation
Boolean functions
Boolean satisfiability solver
checklist generation workflow
commodity devices
commodity IT devices
adversary goals
computer architecture
cyber-attacks
DARPA VET program
DP industry
firmware
firmware-software architecture
FW-SW
graph theory