Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software assurance
biblio
Guidelines on Minimum Standards for Developer Verification of Software
Submitted by willirn1 on Fri, 10/22/2021 - 12:35pm
software assurance
verification
testing
static analysis
fuzzing
code review
software security
biblio
Software Assurance of Autonomous Spacecraft Control
Submitted by grigby1 on Fri, 04/09/2021 - 11:21am
Metrics
Task Analysis
Space vehicles
software interactions
software hazard analysis
software engineers
software engineering
software documentation
software assurance
Software
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
mobile robots
aerospace computing
Information Assurance
in-orbit CubeSat
Human behavior
Hazards
hazard analysis method
Fault protection
composability
collaboration
autonomy demonstration experiment
autonomous spacecraft control
autonomous control
assurance cases
assurance case style
aerospace control
biblio
A Holistic Approach to Cyber Physical Systems Security and Resilience
Submitted by grigby1 on Mon, 03/29/2021 - 11:57am
software assurance
resilience
Resiliency
Resilient Systems
Risk
SAE G-32 Cyber Physical Systems Security Committee
secure systems
security
security of data
Software
pubcrawl
standards
supply chains
system integrators
system security
system security considerations
systems engineering
threats
Trustworthy Systems
Vulnerability
firmware assurance
affordable systems
composability
computer security
cyber
cyber physical system security framework
cyber weaknesses
cyber-physical systems
cybersecurity.
embedded systems
CPS resilience
global supply chain
Hardware
Hardware Assurance
holistic approach
holistic systems engineering approach
Industries
Metrics
Mission Assurance
biblio
Leveraging SecDevOps to Tackle the Technical Debt Associated with Cybersecurity Attack Tactics
Submitted by aekwall on Mon, 02/10/2020 - 12:11pm
software quality
software assurance
technical debt principal
technical consequences
static analysis techniques
source code maintenance
SecDevOps
malicious external attacks
malicious attack tactics
external cybersecurity attacks
external attack tactics
exploitable source code vulnerabilities
cybersecurity attack tactics
Common Weakness Enumerations
system weaknesses
technical debt
security of data
quality assurance
Scalability
program diagnostics
source code (software)
software maintenance
static analysis
computer security
Cybersecurity
tools
composability
pubcrawl
Software measurement
Software
Organizations
biblio
Improved Invariant Generation for Industrial Software Model Checking of Time Properties
Submitted by aekwall on Mon, 02/10/2020 - 12:11pm
automotive embedded software
software assurance
time properties
symbolic model checking
Software verification
SMT solving
safety-critical properties
model-based design tools
model checking
invariant generation
industrial software model checking
formal proof
formal methods
Safety
formal verification
Scalability
Writing
safety-critical software
Formal Specification
Production
tools
composability
pubcrawl
embedded systems
Software
authorization
biblio
Secure Edge Computing with Lightweight Control-Flow Property-based Attestation
Submitted by aekwall on Mon, 02/10/2020 - 12:11pm
security
operational assurance
Protocols
Remote Attestation
remote device
resource-constrained edge services
run-time modifications
Scalability
secure edge computing
lightweight dynamic control-flow property-based attestation architecture
security mechanisms
security of data
Software
software assurance
software integrity
software-based attacks
Trusted Component
critical software components
pubcrawl
Human behavior
Resiliency
attack landscape
Cloud Computing
cloud devices
composability
Control-Flow Property-based Attestation
attestation
decentralized solution
defense mechanism
device-integrity
Hardware
industrial IoT applications
intelligent edge computing systems
Internet of Things
biblio
Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
Software
Scalability
security breaches
Security Evaluation
security of data
security patch
security patch management
security threats
Servers
push-type patch management
software assurance
software vulnerabilities
stochastic reward net
system security
virtual machine
virtual machine based intrusion tolerant system
virtual machines
VM-based intrusion-tolerant system
intrusion tolerance
attack behavior
composability
composite stochastic reward net model
Computational modeling
computer security
computer systems
defense behaviors
interval availability
Resiliency
malicious attack
Markov processes
Markov regenerative process
periodic vulnerability checking strategy
phase expansion
point-wise availability
pubcrawl
pull-type patch management
biblio
Towards Better Utilizing Static Application Security Testing
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
SAST techniques
vulnerability warnings
utilization of software engineering tools
static program analysis
static bug detection
static application security testing
software reliability
software quality
software assurance
security of data
security experts
Scalability
static analysis
SAST product
quality-assurance effort
program testing
program diagnostics
Priv
data visualisation
actionable vulnerability warnings
Resiliency
composability
Human behavior
pubcrawl
biblio
Learning to Identify Security-Related Issues Using Convolutional Neural Networks
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
open source issues
Semantics
user interfaces
agile development practices
aid development teams
CNN
high dimensional word embeddings
issue descriptions
Man-machine systems
natural language descriptions
security issues
robust security assurance
SDL
security-focused automation
security-related content
security-related requirements
software products
two-phase neural net architecture
vulnerability descriptions
software assurance
convolutional neural network
security
Kernel
computer architecture
learning (artificial intelligence)
pubcrawl
composability
deep learning
Databases
convolutional neural nets
security of data
Companies
ontologies (artificial intelligence)
Data mining
public domain software
software security
Scalability
software quality
Human Factors
biblio
Uncertain Requirements, Assurance and Machine Learning
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
pragmatic assurance
deductive verification
financial data processing
financial services
governing bodies
human judgement
inductive assurance
linked evidence
machine-learned components
machine-learning
open-world functionality
conventional machine-learned
predefined requirements
requirements engineering
safety assessment
safety-critical domains
software construction
Standards organizations
uncertain requirements
vehicle control
verification proofs
software assurance
uncertainty
Safety
Ontologies
Software
feature extraction
learning (artificial intelligence)
machine learning
pubcrawl
composability
social networking (online)
social networks
security
privacy
software engineering
software development
assurance
safety-critical software
Scalability
formal verification
assurance case
automotive
« first
‹ previous
1
2
3
4
5
next ›
last »