Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
technical challenges
biblio
CAG: Compliance Adherence and Governance in Software Delivery Using Blockchain
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
SDLC
License verification
Licenses
litigations
metadata
noncomplaint license software
nonconformant behavior
open source components
open-source software components
Policy Based Governance
pubcrawl
public domain software
Libraries
security risks
smart contracts
Software
software delivery
software development life cycle
software development management
software engineering
standard compliances
technical challenges
vulnerability assessment
decentralized CAG
blockchain
blockchain technologies
building software
client industry
collaboration
compliance adherence and governance
compliance specifications
contracts
copyright issues
Crowd Sourcing
cryptocurrencies
auditing
development activities
disparate sources
distributed teams
economic challenges
extraordinary amounts
functional specifications
geographically distributed teams
Global Software Development
legislation
level agreements
biblio
An efficient modular security plane AM-SecP for hybrid distributed SDN
Submitted by grigby1 on Wed, 03/18/2020 - 11:58am
SDN layers which ease packets inspections
Internet service providers
invasive software
malwares
mobile operators
pubcrawl
resilience
Resiliency
Scalability
SDN
internet
SDN security
SDN's security issues
SDNs
security
security of data
Servers
software defined networking
technical challenges
telecommunication traffic
detecting intrusions
centralized network architecture
centralized security layer
computer architecture
Computer crime
computer network security
Conferences
control planes
data plane
denying services
AM-SecP
distributed systems
DoS/DDoS
efficient modular security plane AM-SecP
end user layer
Firewalls (computing)
flexibility
Forensics
hybrid distributed SDN