Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secure system
biblio
System on Chip (SoC) Security Architecture Framework for Isolated Domains Against Threats
Submitted by grigby1 on Fri, 02/17/2023 - 4:10pm
secure system
SoC
isolated domains
arm
policy governance
sandboxing
Embedded System
threats
embedded systems
Robustness
computer architecture
side-channel attacks
composability
system-on-chip
Safety
security
Hardware
pubcrawl
collaboration
biblio
Critical Quality Factors for Rapid, Scalable, Agile Development
Submitted by grigby1 on Fri, 03/27/2020 - 10:28am
security
Q-factor
quality requirements
resilience
Resiliency
Safe Coding
safe system
Safety
scalalble agile
Schedules
secure system
pubcrawl
shared tacit knowledge
Software
software architectures
software development management
software processes
software quality
team working
Unified modeling language
unsecurable agile code
user-developer misunderstandings
executable architecture research project
Agile development
agile methods
agile projects
capability releases
collaboration
common critical quality factors
computer architecture
critical quality factors
daily standup meetings
DP management
2-week sprints
Games
high-quality development
Human behavior
Human Factors
knowledge management
Metrics
parallel agile
policy-based governance
project management
biblio
Accounting for the Human User in Predictive Security Models
Submitted by grigby1 on Thu, 12/28/2017 - 12:30pm
security breaches
predictive security metrics
predictive security models
psychology
pubcrawl
quantitative security metrics
Science of Security
secure system
Security Audits
Predictive Metrics
security designs
Security Metrics
security of data
security researchers
social sciences
software metrics
system security
User behavior
General Deterrence Theory
Computational modeling
Computer crime
computer security
Computer simulation
Computers
Computing Theory
Cyber Attacks
cyber system
accounting
Human behavior
Human Factors
human user
Measurement
Metrics
modeling
Organizations
password security requirements policy