Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Research and Implementation of Intelligent Substation Information Security Risk Assessment Tool
Submitted by aekwall on Mon, 02/17/2020 - 1:28pm
Metrics
tools
Task Analysis
Substations
substation automation
Security Risk Management
security of data
risk management
risk assessment tool
risk assessment platform
risk assessment engine
pubcrawl
Protocols
power system security
Intelligent Data and Security
intelligent substation information security risk assessment tool
intelligent substation
information security level
information security assessment method
information security
Industrial Control Systems
industrial control
Engines
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
Security-Related Stress: A Perspective on Information Security Risk Management
Submitted by aekwall on Mon, 02/17/2020 - 1:28pm
information security
stress inhibitors
security-related stress
security-novice practitioners
novices
ISRM tools
Information Security Risk Management
Security Risk Management
Management
security standards
security of data
Stress
risk management
tools
standards
Compliance
Metrics
pubcrawl
Resiliency
Scalability
biblio
Leveraging SecDevOps to Tackle the Technical Debt Associated with Cybersecurity Attack Tactics
Submitted by aekwall on Mon, 02/10/2020 - 11:11am
software quality
software assurance
technical debt principal
technical consequences
static analysis techniques
source code maintenance
SecDevOps
malicious external attacks
malicious attack tactics
external cybersecurity attacks
external attack tactics
exploitable source code vulnerabilities
cybersecurity attack tactics
Common Weakness Enumerations
system weaknesses
technical debt
security of data
quality assurance
Scalability
program diagnostics
source code (software)
software maintenance
static analysis
computer security
Cybersecurity
tools
composability
pubcrawl
Software measurement
Software
Organizations
biblio
Improved Invariant Generation for Industrial Software Model Checking of Time Properties
Submitted by aekwall on Mon, 02/10/2020 - 11:11am
automotive embedded software
software assurance
time properties
symbolic model checking
Software verification
SMT solving
safety-critical properties
model-based design tools
model checking
invariant generation
industrial software model checking
formal proof
formal methods
Safety
formal verification
Scalability
Writing
safety-critical software
Formal Specification
Production
tools
composability
pubcrawl
embedded systems
Software
authorization
biblio
Identification of the Impacts of Code Changes on the Security of Software
Submitted by aekwall on Mon, 02/10/2020 - 11:09am
electronic commerce
software assurance
software lifetime
software code
security state
security assurance cases
security assurance case
security assessment time
open-source ERP software application
open-source e-commerce software application
Open Source Software
monitored security functions
incremental development
enterprise resource planning
code change impact
assurance case elements
Monitoring
security requirements
Scalability
safety-critical software
Java
code review
source code (software)
software maintenance
Unified modeling language
public domain software
tools
software security
composability
pubcrawl
security
biblio
Towards Automated Security Vulnerability and Software Defect Localization
Submitted by grigby1 on Mon, 02/10/2020 - 10:36am
program diagnostics
undiscovered vulnerabilities
tools
static code analysis
Software systems
software maintenance
software defects
software defect localization
software defect
security vulnerability
security vulnerabilities
security of data
security
resilience
static analysis
modern software
Defect Localization
Cybersecurity
Correlation
Computer bugs
bug
automated security vulnerability
Automated Secure Software Engineering
Resiliency
composability
Human behavior
pubcrawl
biblio
Share, But Be Aware: Security Smells in Python Gists
Submitted by grigby1 on Mon, 02/10/2020 - 10:35am
recurrent coding patterns
tools
static code analysis
static analysis
software security
software maintenance
share code snippets
security weaknesses
security smell
security breaches
security
safety-critical software
Resiliency
resilience
composability
Python
publicly-available Python Gists
publicly-available GitHub Gists
pubcrawl
program diagnostics
password
insecure coding practices
Human behavior
hard-coded secrets
hard-coded passwords
GitHub
Gist
encoding
biblio
The Seven Sins: Security Smells in Infrastructure as Code Scripts
Submitted by grigby1 on Mon, 02/10/2020 - 10:35am
resilience
tools
static code analysis
static analysis
Software
smell
Servers
Security weakness
security smells
security of data
security linter tool
security linter for infrastructure as code scripts
security breaches
security
Resiliency
composability
puppet
pubcrawl
program diagnostics
program debugging
password
infrastructure as code
IaC scripts
Human behavior
hard-coded secret
hard-coded passwords
encoding
empirical study
devsecops
DevOps
biblio
Proactive Secure Coding for iOS Applications
Submitted by grigby1 on Mon, 02/10/2020 - 10:35am
operating systems (computers)
tools
Syntactics
static code analysis
static analysis
security of data
security
secure coding issues
secure APIs
Resiliency
resilience
proactive secure coding
iOS Security
iOS developers
iOS applications
ios
Human behavior
Force
encoding
Computer languages
composability
applications
application program interfaces
pubcrawl
biblio
Automated Combinatorial Testing for Detecting SQL Vulnerabilities in Web Applications
Submitted by grigby1 on Mon, 02/10/2020 - 10:27am
privacy
web applications
tools
Syntactics
SQL vulnerabilities detection
SQL injection vulnerabilities
SQL injection
SQL detection
SQL database backend
SQL
security testing
security of data
Resiliency
resilience
pubcrawl
program testing
attack grammars
policy-based governance
Metrics
internet
Human behavior
gray-box testing method
gray-box testing
Grammar
Databases
concrete attack vectors
combinatorial testing methodology
combinatorial testing
collaboration
automated SQL injection vulnerability testing
automated combinatorial testing
« first
‹ previous
…
40
41
42
43
44
45
46
47
48
…
next ›
last »