Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
requirements analysis
biblio
A STPA-Sec Case Study: Eliciting Early Security Requirements for a Small Unmanned Aerial System
Submitted by grigby1 on Mon, 03/29/2021 - 1:26pm
system life cycle
Scalability
security
security of data
small unmanned aerial system
Stakeholders
STPA-Sec
STPA-Sec case study
subject matter experts
system architecture
safety-critical software
system-theoretic process analysis approach
systems engineering
Systems engineering and theory
systems security analysis
systems security engineering
top down system security requirements analysis approach
UAS operators
United States Air Force Academy Systems Engineering cadets
functional-level security requirements
resilience
architectural-level security specification criteria
autonomous aerial vehicles
computer security
control engineering computing
Cybersecurity
design-level engineering considerations
early security requirements
expert systems
Control Theory
Hazards
Human behavior
notional SUAS system case study
pubcrawl
requirements analysis
Resiliency
resiliency requirements
safety requirements
biblio
A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System
Submitted by aekwall on Mon, 11/16/2020 - 2:57pm
system life cycle
ISO/IEC/IEEE 152SS
NIST SP SOO-160
notional autonomous space system
notional space system
secure cyber-physical systems
software engineering processes
space missions
Space vehicles
STPA-Sec
functional-level security requirements
system operation
system-theoretic process analysis approach for security
systems security analysis
systems security engineering
systems security requirements
top down approach
top down systems security requirements analysis approach
traceable security
Resilient Security Architectures
Software Architecture
security of data
security
cyber-physical systems
Resiliency
pubcrawl
Cybersecurity
Stakeholders
IEC standards
ISO standards
Safety
resilience
Formal Specification
aerospace computing
IEEE standards
requirements analysis
system architecture
resiliency requirements
architectural-level security specifications
biblio
Engineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
psychology
Computing Theory and Trust
trust modeling
systems engineering processes
Systems architecture
System Engineering
requirements analysis
graph-based modeling methodology
graph-based algorithm
engineering trust
disparate system
Component architectures
complex multitiered system architectures
complex intersystem trust relationships
Compositionality
cognition
security of data
modeling
Risk
evaluation
Trust management
Measurement
trust
systems engineering
Vulnerability
Metrics
Computational modeling
graph theory
composability
pubcrawl
Trusted Computing
biblio
A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems
Submitted by grigby1 on Wed, 10/02/2019 - 2:55pm
Resiliency
viable systems security analysis approach
traceable security
technology reliant environment
system-theoretic process analysis approach
systems security engineering
systems security analysis
STPA-Sec
software engineering processes
software engineering
security processes
security of data
security architecture analysis approaches
resiliency requirements
architectural-level engineering considerations
resilience
requirements analysis
readily understandable description
pubcrawl
key architectural analysis definitions
functional-level security requirements
Formal Specification
eliciting security requirements
design-level security criteria
dependably secure systems
cyber-physical systems
complex cyber-physical systems
biblio
A Framework to Measure Experts' Decision Making in Security Requirements Analysis
Submitted by Jamie Presken on Mon, 12/05/2016 - 3:39pm
CMU
decision-making
July'14
Patterns
requirements analysis
security
Situation Awareness
CMU
July'14
file
Hibshi_Framework_TB.pdf
Submitted by Jamie Presken on Mon, 12/05/2016 - 3:39pm
CMU
decision-making
July'14
Patterns
requirements analysis
security
Situation Awareness