Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SDLC
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 2:41pm
OWASP
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
information confidentiality
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
software engineering
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
security of data
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
biblio
CAG: Compliance Adherence and Governance in Software Delivery Using Blockchain
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
SDLC
License verification
Licenses
litigations
metadata
noncomplaint license software
nonconformant behavior
open source components
open-source software components
Policy Based Governance
pubcrawl
public domain software
Libraries
security risks
smart contracts
Software
software delivery
software development life cycle
software development management
software engineering
standard compliances
technical challenges
vulnerability assessment
decentralized CAG
blockchain
blockchain technologies
building software
client industry
collaboration
compliance adherence and governance
compliance specifications
contracts
copyright issues
Crowd Sourcing
cryptocurrencies
auditing
development activities
disparate sources
distributed teams
economic challenges
extraordinary amounts
functional specifications
geographically distributed teams
Global Software Development
legislation
level agreements
biblio
A Preliminary Structure of Software Security Assurance Model
Submitted by grigby1 on Mon, 02/25/2019 - 3:17pm
security challenges
software assurance
Vendors
systematic mapping study
systematic literature review
SSAM model
software security contributions
software security assurance model
software engineering
software development methodologies
software development life cycle
SMS
security of data
secure software
SDLC
GSD vendor organisations
global software development vendors
Global Software Development
empirical study
case study
software security
composability
Scalability
pubcrawl
biblio
Improving Attention to Security in Software Design with Analytics and Cognitive Techniques
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
software design
security
security design
Security Engineering
security knowledge
security of data
social aspects of automation
Software
software assurance
secure software
software development life cycle
software engineering
software security
testing
threat
tools
Vulnerability
encoding
build security in
building security in
Buildings
chasm
cognitive techniques
composability
developer productivity
diverse development organization
automated tools
Organizations
pubcrawl
Scalability
SDLC
secure design
secure development
secure engineering
biblio
Security threat identification using energy points
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
pubcrawl
software engineering
software development lifecycle
Software
security threat identification
security process
security of data
security mechanisms
security breaches
SDLC
Scientific Computing Security
Resiliency
Central Processing Unit
Power demand
power aware computing
Metrics
energy points
energy consumption
energy based denial of service attacks
DoS attack
cosmic Method
Computers
Computer crime
Compositionality