Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Patterns
biblio
A Proposed Approach to Build an Automated Software Security Assessment Framework using Mined Patterns and Metrics
Submitted by aekwall on Mon, 03/02/2020 - 11:30am
security-specific properties
mined patterns
Patterns
pubcrawl
reliable software
Resiliency
Scalability
secure code
security
security of data
security-centric
Metrics
Software
software metrics
software security
software security level
Software Vulnerability
text analysis
tools
Ubiquitous Computing Security
Vulnerability prediction
Data mining
Security Metrics
automated framework
Automated Secure Software Engineering
automated software security assessment framework
building security-specific metrics
coding theory
Complexity theory
composability
current software metrics
Computing Theory
encoding
estimated security level
existing nanopatterns
generic patterns
graph theory
Human Factors
Java
Java method-level traceable patterns
machine learning
biblio
Towards Swarm Intelligence Architectural Patterns: an IoT-Big Data-AI-Blockchain convergence perspective
Submitted by aekwall on Mon, 01/27/2020 - 9:24am
IoT
pubcrawl
composability
Swarm Intelligence
Decision Making
Compositionality
AI
Big Data Analytics
Patterns
biblio
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels
Submitted by grigby1 on Thu, 09/05/2019 - 10:25am
Compositionality
Countermeasure Variation
covert channels
data leakage prevention
Information hiding
network security
Patterns
resilience
Scalability
Steganography
biblio
Vehicle Network Security Testing
Submitted by grigby1 on Mon, 03/05/2018 - 12:06pm
testing
Patterns
Payloads
Protocols
pubcrawl
resilience
Resiliency
security
security loophole
pattern decoding
V2V
V2V V2X loopholes
V2X
vehicle
vehicle network security testing
vehicular ad hoc networks
white box approach
White Box Encryption
gateway module security testing
black box approach
CAN
Communication networks
composability
computer network security
diagnostics security
ECU
Ethernet
authentication
gateway security
grey box approach
in-vehicle network security implementation
in-vehicle networks
internetworking
message authentication
Metrics
Network
biblio
Quality Attestation: An Open Source Pattern
Submitted by grigby1 on Thu, 04/20/2017 - 11:28am
attestation
attractiveness
Metrics
open source
Patterns
pubcrawl
quality
Resiliency
biblio
A Framework to Measure Experts' Decision Making in Security Requirements Analysis
Submitted by Jamie Presken on Mon, 12/05/2016 - 2:39pm
CMU
decision-making
July'14
Patterns
requirements analysis
security
Situation Awareness
CMU
July'14
file
Hibshi_Framework_TB.pdf
Submitted by Jamie Presken on Mon, 12/05/2016 - 2:39pm
CMU
decision-making
July'14
Patterns
requirements analysis
security
Situation Awareness
file
Hibshi_Discovering_Dec_Making_TB.pdf
Submitted by Jamie Presken on Mon, 12/05/2016 - 1:15pm
analysis
Apr'15
CMU
decision-making
Patterns
Requirements
security
Situation Awareness
biblio
Discovering Decision-Making Patterns for Security Novices and Experts
Submitted by Jamie Presken on Mon, 12/05/2016 - 1:15pm
analysis
Apr'15
CMU
decision-making
Patterns
Requirements
security
Situation Awareness
CMU
Apr'15
biblio
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns
Submitted by Katie Dey on Fri, 10/24/2014 - 11:52am
Science of Security
Patterns
taxonomy
software reusability
Software
security patterns
security of data
security knowledge
security
Science of Security
requirements engineering pattern
requirements engineering
psychology
abstraction
patternmining
Pattern recognition
pattern experimentation
object-oriented methods
Natural languages
knowledge reuse
information security guidelines
formal verification
documentation
cognitive psychology
CMU
CMU
1
2
next ›
last »