Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer bugs
biblio
Cryptography classes in bugs framework (BF): Encryption bugs (ENC), verification bugs (VRF), and key management bugs (KMN)
Submitted by grigby1 on Wed, 02/21/2018 - 12:39pm
secondary causes
program diagnostics
program verification
proximate causes
pubcrawl
related dynamic properties
resilience
Resiliency
rigorous definitions
Scalability
program debugging
soft-ware weaknesses
Software
software vulnerabilities
software weaknesses
taxonomy
tertiary causes
unambiguous definitions
verification bugs
VRF
cryptography related classes
authentication
attacks
bug classes
Bug taxonomy
bugs framework
clear descriptions
Computer bugs
Cryptography
cryptography classes
BF taxonomy
developed BF classes
ENC
encryption
Encryption bugs
Human behavior
key management
key management bugs
KMN
Metrics
biblio
A Catalog of Security Architecture Weaknesses
Submitted by grigby1 on Fri, 02/02/2018 - 12:27pm
pubcrawl
weakness
Software systems
software reliability
software quality
software assurance
software architecture design
Software Architecture
security tactics
security of data
security design thinking
security bugs
security architecture weaknesses
security architectural flaw identification
secure software systems
Scalability
architectural choices
mitigation techniques
internet
interactive Web-based solution
interactive systems
Flaw
Computer bugs
computer architecture
composability
Common Architectural Weakness Enumeration
CAWE catalog
CAWE
authentication
architecture
architectural decisions
biblio
FairTest: Discovering Unwarranted Associations in Data-Driven Applications
Submitted by K_Hooper on Fri, 02/02/2018 - 10:02am
machine learning algorithms
Algorithmic Fairness
algorithmic fairness formalization
Computer bugs
data analysis
Data collection
data privacy
data-driven applications
debugging capabilities
Decision Making
decision-making
fairness metrics
FairTest
Google
unwarranted association discovery
Measurement
Medical services
Metrics
Predictive Metrics
program debugging
pubcrawl
sensitive user attributes
software tools
Statistics
Systems
testing
tools
UA framework
biblio
Predicting Release Reliability
Submitted by K_Hooper on Fri, 02/02/2018 - 10:02am
Metrics
bug fixing
code coverage
Computer bugs
conceptual simplification
Correlation
customer experience
customer services
demanding quantitative evidence
field bug
functional extension
internal customers
internal stakeholders
Mathematical model
Measurement
testing
modeling
pre-release metrics
predicting release reliability
prediction
Predictive Metrics
prerelease metrics
pubcrawl
release comparisons
reliability performance
software metrics
software release reliability
software reliability
software reliability assessment mechanism
biblio
Towards comprehensive protection for OpenFlow controllers
Submitted by grigby1 on Wed, 01/10/2018 - 11:24am
Cross Layer Security
Virtual machine monitors
telecommunication control
security
Resiliency
pubcrawl
operating systems
OpenFlow critical component
OpenFlow controller
malicious controller
Industrial Control Systems
dynamic networks
adaptive networks
cross layer diversity
control systems
control plane-data ploane decoupling
control logic
computer network security
Computer bugs
computer architecture
composability
Attack vectors
agile networks
biblio
IntPTI: Automatic integer error repair with proper-type inference
Submitted by grigby1 on Thu, 12/28/2017 - 12:40pm
Computer bugs
fix pattern
integer error
maintenance engineering
pubcrawl
Runtime
Scalability
security
security scalability
Semantics
tools
type inference
biblio
Characterization of failure dynamics in SDN controllers
Submitted by grigby1 on Thu, 12/28/2017 - 12:37pm
Software
network performance
physical network infrastructure
Policy-Governed Secure Collaboration
pubcrawl
Resiliency
Scalability
Science of Security
SDN controller
network applications
software ageing
software defined networking
software reliability
software reliability growth
Stochastic Activity Networks
Stochastic processes
telecommunication control
controller steady state availability
collaboration
commercial controller implementations
composability
Computational modeling
Computer bugs
control plane logic
controller failure modes
controller outages
aging
failure analysis
failure dynamics
Hardware
Human behavior
Human Factors
hypothetical controller
Metrics
file
07965451.pdf
Submitted by drwright on Wed, 09/06/2017 - 10:29am
RASA
test efforts
Stack traces
Software systems
software engineering
software development lifecycle
security of data
security
risk-based attack surface approximation
attack surface
random sampling
proactive security reviews
prediction models
Mozilla Firefox
microsoft windows
Measurement
Computer bugs
biblio
Risk-based attack surface approximation: how much data is enough?
Submitted by drwright on Wed, 09/06/2017 - 10:29am
RASA
test efforts
Stack traces
Software systems
software engineering
software development lifecycle
security of data
security
risk-based attack surface approximation
attack surface
random sampling
proactive security reviews
prediction models
Mozilla Firefox
microsoft windows
Measurement
Computer bugs
« first
‹ previous
1
2
3
4
5
6
7
8