Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security holes
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 1:41pm
OWASP
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
information confidentiality
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
software engineering
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
security of data
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
biblio
Performance Analysis of Cluster based Secured Key Management Schemes in WSN
Submitted by aekwall on Mon, 09/21/2020 - 2:46pm
large scale networks
wireless sensor networks
transmitted information
telecommunication network management
symmetric sets
security of data
security holes
secure transmission
secure information transmission
secure clusters
Routing
Resiliency
pubcrawl
privacy
mystery keys
asymmetric key sets
key management schemes
key management framework
Key Management and Secure Transmission
information security
information records
encoded data
cyber-physical systems
Cryptography
confinement
composability
clustering
cluster-based wireless sensor networks
CBWSN
biblio
Towards Real-Time-Aware Intrusion Tolerance
Submitted by aekwall on Mon, 07/27/2020 - 11:11am
cyber-physical realtime systems
control engineering computing
intrusion tolerance
cyber physical systems
ISO 26262
safety systems
assisted/autonomous driving
automotive use-cases
cyber-physical real-time systems
authentication
EN IEC 62061
EN ISO 13849
functional safety regulations
real-time-aware intrusion tolerance
real-time-aware intrusion-tolerant architectures
safety requirements
security holes
security
Attack vectors
mobile robots
composability
pubcrawl
Resiliency
cyber-physical systems
real-time systems
Protocols
traffic engineering computing
security of data
Safety
road vehicles
road safety
Automotive engineering
automobiles