Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security Metrics
biblio
Metrics-based Knowledge Analysis in Software Design for Web-based Application Security Protection
Submitted by grigby1 on Fri, 04/01/2022 - 2:48pm
tools
pubcrawl
Software
Metrics
software metrics
software security
Knowledge engineering
Media
Security Metrics
Communications technology
software design
Digital art
knowledge analysis
secure implementation
biblio
IoT Metrics and Automation for Security Evaluation
Submitted by grigby1 on Fri, 04/01/2022 - 2:48pm
Internet of Things
security
IoT
pubcrawl
standards
Metrics
research and development
automation
Security Metrics
Time measurement
Time to market
biblio
An Empirical Study On Software Metrics and Machine Learning to Identify Untrustworthy Code
Submitted by grigby1 on Fri, 04/01/2022 - 2:47pm
machine learning
pubcrawl
Medical services
Decision Making
Metrics
Europe
Government
Security Metrics
software metrics
codes
Code Trustworthiness Assessment
Consensus-Based Decision-Making
software vulnerabilities
biblio
Machine Learning to Combine Static Analysis Alerts with Software Metrics to Detect Security Vulnerabilities: An Empirical Study
Submitted by grigby1 on Fri, 04/01/2022 - 2:47pm
Computing Theory
Security Metrics
codes
machine learning
Measurement
Metrics
pubcrawl
security
Software algorithms
software metrics
static analysis
static code analysis
tools
vulnerability detection
biblio
Introducing Mobility Metrics in Trust-based Security of Routing Protocol for Internet of Things
Submitted by grigby1 on Fri, 04/01/2022 - 2:47pm
Security by Default
Internet of Things
Linear programming
Measurement
Metrics
mobile nodes
Mobility
pubcrawl
Routing
Routing protocols
RPL
security
Security Metrics
smart cities
Smart homes
trust
biblio
A Security Scoring Framework to Quantify Security in Cyber-Physical Systems
Submitted by grigby1 on Fri, 04/01/2022 - 2:47pm
industrial cyber-physical systems
threat analysis
Security Scoring
security scalability
Security Rating
Security Metrics
security metric
pubcrawl
Metrics
security weaknesses
Data models
cyber-physical systems
critical infrastructure
connected vehicles
Conferences
automation
Adaptation models
biblio
Resilience-Based Performance Measures for Next-Generation Systems Security Engineering
Submitted by grigby1 on Fri, 04/01/2022 - 2:46pm
security
pubcrawl
Nonhomogeneous media
Metrics
Measurement
Complexity theory
resilience
Markov processes
Technological innovation
Security Metrics
Disruptive technologies
Multilayer networks
Systems security engineering High consequence facility security
biblio
Investigating the Changes in Software Metrics after Vulnerability Is Fixed
Submitted by grigby1 on Thu, 02/24/2022 - 2:49pm
big data security metrics
codes
Measurement
Metrics
Predictive models
predictive security metrics
pubcrawl
Security Metrics
software metric
software metrics
software security
static analysis
Text Mining
Vulnerability
Writing
biblio
SAIF: Automated Asset Identification for Security Verification at the Register Transfer Level
Submitted by aekwall on Tue, 02/22/2022 - 2:16pm
Measurement and Metrics Testing
vulnerability assessment
security verification.
Security Metrics
security assets
Solid modeling
Very large scale integration
Registers
Metrics
pubcrawl
Analytical models
Hardware
Measurement
Benchmark testing
biblio
Security Metric for Networks with Intrusion Detection Systems having Time Latency using Attack Graphs
Submitted by aekwall on Mon, 01/10/2022 - 12:51pm
intrusion detection system
uncertainty
Security Metrics
Security Metric and Time Latency
Resiliency
pubcrawl
Probabilistic logic
Predictive Metrics
Measurement
Security Risk Estimation
Intrusion Detection
estimation
Computational modeling
composability
attack graphs
attack graph
Adaptation models
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »