Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» CMU
CMU
biblio
Limiting Recertification in Highly Configurable Systems Analyzing Interactions and Isolation among Configuration Options
Submitted by Jamie Presken on Thu, 12/08/2016 - 7:46am
certification
CMU
composability
configuration options
July'14
network analysis
Security Metrics
CMU
July'14
biblio
Improving Security Requirements Adequacy An Interval Type 2 Fuzzy Logic Security Assessment System
Submitted by Jamie Presken on Thu, 12/08/2016 - 7:20am
CMU
Fuzzy logic
Jan'17
recommender system
scenarios
security requirements
type-2
uncertainty
user study
vignettes
CMU
Jan'17
biblio
Toward a framework for detecting privacy policy violations in android application code
Submitted by Jamie Presken on Wed, 12/07/2016 - 2:45pm
Android applications
CMU
July'16
Privacy Policies
Violation Detection
CMU
July'16
biblio
Towards Verified Privacy Policy Compliance of an Actor-based Electronic Medical Record Systems
Submitted by Jamie Presken on Wed, 12/07/2016 - 2:35pm
CMU
Jan'16
CMU
Jan'16
biblio
Detecting Repurposing and Over-Collection in Multi-party Privacy Requirements Specifications
Submitted by Jamie Presken on Wed, 12/07/2016 - 2:11pm
CMU
data flow analysis
July'15
privacy principles
requirements validation
CMU
July'15
biblio
How have we evaluated software pattern application? A systematic mapping study of research design practices
Submitted by Jamie Presken on Wed, 12/07/2016 - 2:05pm
CMU
Oct'15
CMU
Oct'15
biblio
Managing security requirements patterns using feature diagram hierarchies
Submitted by Jamie Presken on Wed, 12/07/2016 - 1:58pm
CMU
Oct'14
CMU
Oct'14
biblio
Rethinking Security Requirements in RE Research
Submitted by Jamie Presken on Wed, 12/07/2016 - 1:46pm
CMU
requirements; security; privacy; usability; literature survey
CMU
biblio
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns
Submitted by Jamie Presken on Wed, 12/07/2016 - 1:42pm
CMU
requirements engineering; patterns; patternmining; abstraction
CMU
biblio
Characterizations and boundaries of security requirements patterns
Submitted by Jamie Presken on Wed, 12/07/2016 - 1:39pm
CMU
CMU
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »