Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Open Source Software
biblio
Identifying and Documenting False Positive Patterns Generated by Static Code Analysis Tools
Submitted by grigby1 on Thu, 06/07/2018 - 3:12pm
public domain software
warning message
tools
system documentation
static code analysis tools
static code analysis
software tools
software engineering
security
Resiliency
resilience
commercial tool
pubcrawl
program diagnostics
open-source tools
Open Source Software
Human behavior
false positive pattern identification
false positive pattern documentation
Context
Conferences
composability
biblio
A Regression Model Based Approach for Identifying Security Requirements in Open Source Software Development
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
open source software development
up-front RE
textual information retrieval techniques
testing
software engineering
security requirements identification methods
security requirements identification
security of data
security
Resiliency
resilience
requirements engineering
regression model based approach
regression analysis
pubcrawl
OSS projects
coding theory
Open Source Software
Metrics
Measurement
Logistics
logistic regression
lightweight representation
just-in-time requirements engineering
information retrieval
Formal Specification
Cryptography
Compositionality
Complexity theory
comment writing
comment security aspect
biblio
Efficient and Flexible Discovery of PHP Application Vulnerabilities
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
PHP application vulnerabilities
web applications
vulnerability scanner
Syntactics
Structured Query Language
SQL injection
Servers
security
Scalability
Resiliency
resilience
pubcrawl
Programming Language
programming
code property graphs
PHP
Open Source Software
interprocedural analysis technique
internet
information flow analysis
Human Factors
human factor
Human behavior
graph theory
graph database
Databases
Cross Site Scripting (XSS)
Cross Site Scripting
biblio
Studying cyber security threats to web platforms using attack tree diagrams
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
information technology
WordPress vulnerabilities
WordPress platform
Web platforms
Web platform
trees (mathematics)
security threats
security personnel
security of data
Scalability
Resiliency
pubcrawl
Organizations
Open Source Software
Metrics
internet
artificial intelligence security
information systems designers
Information systems
Human behavior
graphical analysis
global reference system
cyber-attack
cyber security threats
Computers
computer system
computer security threats
computer security
common vulnerabilities
Attack Tree method
attack tree diagrams
attack tree
biblio
Data Protection in OpenStack
Submitted by grigby1 on Tue, 01/16/2018 - 6:33pm
operational cloud deployment
virtual machines
virtual machine images
storage encryption
security of data
security features
Security analysis
Scalability
Resiliency
public domain software
pubcrawl
Pervasive Computing Security
Organizations
basic security controls
OpenStack range
Open Source Software
open source cloud computing platform
Neutrons
Metrics
Human Factors
Hardware
encryption
Data Security
Data protection
cloud providers
Cloud Computing
biblio
The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
predictive security metrics
vulnerable components
vulnerability prediction models
text mining features
Text Mining
text analysis
term frequencies
statistical prediction models
statistical learning machinery
software metrics
security
pubcrawl
principal component analysis
computer security
Predictive models
Open Source Software
Metrics
machine learning
learning (artificial intelligence)
large software projects
Feature Selection
dimensionality reduction technique
Data mining
cross-validation
cross-project prediction experiments
confirmatory factor analysis
biblio
Making Invisible Things Visible: Tracking Down Known Vulnerabilities at 3000 Companies (Showcase)
Submitted by grigby1 on Wed, 05/17/2017 - 1:34pm
Continuous Integration
DevOps
Nexus Firewall
Nexus Repository OSS
Open Source Software
OSS Repository Hosting
OSSRH
pubcrawl
Resiliency
Software Component Lifecycle Management
Software Variability Management
Sonatype
supply chain risk assessment
supply chain security
The Central Repository
« first
‹ previous
1
2
3
4
5
6