Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software reliability
biblio
Theoretical Feasibility of Statistical Assurance of Programmable Systems Based on Simulation Tests
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
simulated hardware platform
ultra-high reliability levels
theoretical feasibility
testing
test time expansion problem
Test Time Expansion
statistical testing
statistical test
statistical assurance
statistical analysis
software-intensive system
software reliability
software assurance
Software
simulation tests
composability
Scalability
reliability theory
Reliability
pubcrawl
protection system
programmable systems
program testing
platform simulation approach
Hardware
Failure Probability
estimation
Emulation/Simulation-enhanced Test
empirical failure probability estimation
continuous operation systems
biblio
A Catalog of Security Architecture Weaknesses
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
pubcrawl
weakness
Software systems
software reliability
software quality
software assurance
software architecture design
Software Architecture
security tactics
security of data
security design thinking
security bugs
security architecture weaknesses
security architectural flaw identification
secure software systems
Scalability
architectural choices
mitigation techniques
internet
interactive Web-based solution
interactive systems
Flaw
Computer bugs
computer architecture
composability
Common Architectural Weakness Enumeration
CAWE catalog
CAWE
authentication
architecture
architectural decisions
biblio
A Software Security Case Developing Method Based on Hierarchical Argument Strategy
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
Reliability engineering
threat classification
Stakeholders
software reliability
software engineering
software assurance
Software
security of data
security
Scalability
Safety
argument pattern
pubcrawl
pattern classification
hierarchical software security case development method
hierarchical asset-threat-control
hierarchical argument strategy
composability
assurance case
asset identification
asset classification
argument strategy
biblio
Predicting Release Reliability
Submitted by K_Hooper on Fri, 02/02/2018 - 11:02am
Metrics
bug fixing
code coverage
Computer bugs
conceptual simplification
Correlation
customer experience
customer services
demanding quantitative evidence
field bug
functional extension
internal customers
internal stakeholders
Mathematical model
Measurement
testing
modeling
pre-release metrics
predicting release reliability
prediction
Predictive Metrics
prerelease metrics
pubcrawl
release comparisons
reliability performance
software metrics
software release reliability
software reliability
software reliability assessment mechanism
biblio
Characterization of failure dynamics in SDN controllers
Submitted by grigby1 on Thu, 12/28/2017 - 1:37pm
Software
network performance
physical network infrastructure
Policy-Governed Secure Collaboration
pubcrawl
Resiliency
Scalability
Science of Security
SDN controller
network applications
software ageing
software defined networking
software reliability
software reliability growth
Stochastic Activity Networks
Stochastic processes
telecommunication control
controller steady state availability
collaboration
commercial controller implementations
composability
Computational modeling
Computer bugs
control plane logic
controller failure modes
controller outages
aging
failure analysis
failure dynamics
Hardware
Human behavior
Human Factors
hypothetical controller
Metrics
biblio
Advances and challenges of quantitative verification and synthesis for cyber-physical systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Monitoring
Wearable devices
software reliability
Software
self-driving cars
Science of Security
Scalability
safety-critical software
safety critical contexts
robotic assistants
Resiliency
Quantitative Verification
pubcrawl
Probabilistic logic
Policy-Governed Secure Collaboration
Adaptation models
Metrics
Markov processes
internet
implantable devices
Human Factors
Human behavior
formal verification
factory automation systems
cyber-physical systems
composability
collaboration
business-critical contexts
Biomedical monitoring
biblio
Early Identification of Vulnerable Software Components via Ensemble Learning
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Resiliency
vulnerability detection scheme
vulnerability detection
Vulnerability
Training data
Training
supports vector machine algorithm
Support vector machines
support vector machine
software testing process
Software systems
software reliability
smart phones
security of data
robust software system
Compositionality
pubcrawl
program testing
Predictive models
Prediction algorithms
object-oriented programming
mislabeled data
Metrics
learning (artificial intelligence)
Java Android applications
Java
Human Factors
Human behavior
Ensemble Learning
early vulnerable software component identification
biblio
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
finite field
vigilant periodic sequence algorithm
software reliability
software fault tolerance
security perspectives
scalar multiplication algorithm
scalar multiplication
Resiliency
public key cryptography
pubcrawl
physical attacks
Metrics
Algorithm design and analysis
fault injection attack
Fault Attacks
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECDSA
digital signatures
composability
Circuit faults
biblio
Forecasting severity of software vulnerability using grey model GM(1,1)
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
Predictive models
Vulnerability
software vulnerability forecasting severity
software security level
software security
software risk level
software reliability
Software
severity
security of data
security
pubcrawl170107
grey model
prediction
Measurement
Mathematical model
grey theory
grey systems
grey system theory
GM(1
forecasting theory
forecasting
Data models
biblio
"Enhancing Network Security by Software Vulnerability Detection Using Social Media Analysis Extended Abstract"
Submitted by abfox on Tue, 02/14/2017 - 2:21pm
online service
web services
vulnerable target
unknown security vulnerability
Twitter
software vulnerability detection
software reliability
social networking (online)
social media analysis
security of data
real-time systems
real-time social media stream
pubcrawl170101
post-incident intrusion detection
Pattern recognition
attacked target system
network security
media streaming
Media
Intrusion Detection
firewalls
firewall
exposures database
detecting attack
database management systems
Crowd-based
common vulnerability
Automatic Network Configuration
automated reconfiguration
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »