Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Secure Coding
biblio
Secure Polar Coding with Non-stationary Channel Polarization
Submitted by grigby1 on Fri, 04/14/2023 - 2:52pm
Metrics
Secure Coding
Resiliency
resilience
reliability theory
pubcrawl
polar codes
polar code
non-stationary channels
coding theory
encoding
computer security
composability
Complexity theory
Communication Systems
Channel models
channel coding
security
biblio
Designing a Serious Game: Teaching Developers to Embed Privacy into Software Systems
Submitted by grigby1 on Thu, 06/24/2021 - 10:25am
pubcrawl
resilience
Resiliency
Software
privacy
data privacy
composability
encoding
Games
Software systems
usable security and privacy
devsecops
Minimization
Privacy-preserving Systems
Secure Coding
Automated Secure Software Engineering
biblio
Development of Incident Response Tool for Cyber Security Training Based on Virtualization and Cloud
Submitted by grigby1 on Fri, 04/17/2020 - 10:28am
Resiliency
Korean e-government framework
Korean government agency
Linux
Metrics
military war game modeling
modeling and simulation
pubcrawl
resilience
infringement incident response tool
scenario based infringement incident response training
Secure Coding
virtualisation
virtualization-based infringement incident response tool
vulnerability measure practice
Window operating system environments
Windows Operating System Security
actual information system
government data processing
defense practice
cyber security training system
cyber security threats
cyber security experts
cyber security
computer science education
Computer crime
computer based training
composability
Cloud Computing
cloud
CBT type remote education
artificial intelligence technology
artificial intelligenc
biblio
Secure Coding Practices in Java: Challenges and Vulnerabilities
Submitted by grigby1 on Wed, 10/30/2019 - 9:53am
Security by Default
multiple security vulnerabilities
programming
programming challenges
programming obstacles
pubcrawl
resilience
Resiliency
Scalability
Secure Coding
secure coding assistance
secure coding practices
Libraries
Spring security
SSL-TLS security
SSL/TLS
StackOverflow
StackOverflow forum
StackOverflow posts
third-party framework
third-party libraries
XML
XML-based approaches
cryptographic hash functions
security
application program interfaces
authentication
authorisation
authorization
authorization features
Certificate Validation
complex Java-based
complicated cross-language data handling
Computer crime
cross-site request forgery attacks
coding theory
Cryptography
cryptography API
CSRF
developers time
empirical study
encoding
insecure coding practices
Java
Java platform
Java secure coding
biblio
Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques
Submitted by grigby1 on Thu, 09/26/2019 - 9:25am
resilience
tools
Text Mining
standards
SQL injection vulnerabilities
SQL injection
SQL
source code (software)
software vulnerabilities
Software
singular decision trees
security of data
security
Secure Coding
Safe Coding
Resiliency
code analysis
Python
pubcrawl
program diagnostics
policy-based governance
natural language techniques
natural language processing
Metrics
Java program
Java byte code
Java
Human Factors
Human behavior
Decision trees
collaboration
code analysis tools