Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

potential security breaches

biblio

Visible to the public A Position Study to Investigate Technical Debt Associated with Security Weaknesses

Submitted by aekwall on Mon, 08/26/2019 - 10:06am
  • common weakness scoring system
  • security of data
  • security
  • Software
  • Software measurement
  • Human behavior
  • pubcrawl
  • policy-based governance
  • Metrics
  • tools
  • Companies
  • static analysis
  • software development management
  • catching vulnerabilities
  • Common Weakness Enumeration
  • resilience
  • CWSS scores
  • decidedly negative impacts
  • design level CWE
  • exploitable weaknesses
  • five-step approach
  • potential security breaches
  • quality assurance
  • Quamoco quality model
  • scoring mechanism
  • security weaknesses
  • software lifecycle
  • software quality
  • TD
  • technical debt
biblio

Visible to the public Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach

Submitted by grigby1 on Wed, 05/01/2019 - 11:34am
  • Metrics
  • verifying security policies
  • security policies
  • security of data
  • security
  • Scalability
  • Resiliency
  • resilience
  • Redundancy
  • pubcrawl
  • potential security breaches
  • Policy Validation and Correction.
  • pattern clustering
  • obtained clusters
  • nonallowed accesses
  • ABAC Policy
  • Image edge detection
  • edge detection
  • Conferences
  • composability
  • clustering technique
  • clustering
  • big data environments
  • Big Data
  • Anomaly Detection and Resolution
  • Anomaly Detection
  • access log based approach
  • Access Log
  • Access Control

Terms of Use  |  ©2023. CPS-VO