Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software engineering
biblio
Security Vulnerability Metrics for Connected Vehicles
Submitted by grigby1 on Mon, 03/09/2020 - 1:38pm
security
vulnerable function assessment
vulnerability predication
vehicle software system
vehicle manufacturers
software testers
Software systems
software integration
software engineering
security vulnerability metrics
security vulnerabilities
security testing
security of data
Security Metrics
Measurement
pubcrawl
program testing
OpenPilot
Metrics
Measurement and Metrics Texting
Couplings
connected vehicles
complex software functionalities
Autopilot feature
Automotive engineering
automobiles
metrics testing
biblio
A Systematic Requirements and Risks-Based Test Case Prioritization Using a Fuzzy Expert System
Submitted by aekwall on Mon, 03/09/2020 - 10:16am
requirements risks-based testing
testing
test case prioritization
systematic requirements
software requirements
software engineers
software engineering
software components
Software
Security Risk Estimation
security
Scalability
risk-based approaches
risk information
risk estimation process
Resiliency
False Data Detection
regression testing
regression analysis
pubcrawl
program testing
Metrics
Iron
Human Factors
Human behavior
fuzzy set theory
fuzzy expert systems
fuzzy expert system
Expert Systems and Security
expert systems
estimation
Complexity theory
biblio
Security Risk Assessment and Management as Technical Debt
Submitted by aekwall on Mon, 02/17/2020 - 1:27pm
technical debt
technical debt management systems
software development organizations
software design
security risk assessment
security engineering techniques
security debt management approach
security debt
risk-based security engineering processes
risk-based extensions
portfolio-based technical debt management framework
iterative software development
Security Risk Management
information security
security of data
risk analysis
security management
software security
Unified modeling language
software engineering
risk management
Metrics
Iterative methods
pubcrawl
Resiliency
Software
Organizations
Scalability
biblio
Uncertain Requirements, Assurance and Machine Learning
Submitted by aekwall on Mon, 02/10/2020 - 11:10am
pragmatic assurance
deductive verification
financial data processing
financial services
governing bodies
human judgement
inductive assurance
linked evidence
machine-learned components
machine-learning
open-world functionality
conventional machine-learned
predefined requirements
requirements engineering
safety assessment
safety-critical domains
software construction
Standards organizations
uncertain requirements
vehicle control
verification proofs
software assurance
uncertainty
Safety
Ontologies
Software
feature extraction
learning (artificial intelligence)
machine learning
pubcrawl
composability
social networking (online)
social networks
security
privacy
software engineering
software development
assurance
safety-critical software
Scalability
formal verification
assurance case
automotive
biblio
Interventions for Software Security: Creating a Lightweight Program of Assurance Techniques for Developers
Submitted by aekwall on Mon, 02/10/2020 - 11:09am
development organizations
software assurance
team
software development teams
software developer
security professionals
security culture
lightweight program
intervention
facilitated workshops
security of data
Developer centered security
assurance techniques
action research
Scalability
security experts
software security
software engineering
composability
pubcrawl
biblio
DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development
Submitted by grigby1 on Mon, 02/10/2020 - 10:36am
program diagnostics
Tainted data flow
static code analysis
static analysis-based security analysis approach
static analysis plugin
static analysis
SQL injection
software engineering
Software
security of data
Secure Software Development
Resiliency
resilience
pubcrawl
android
password
mobile software development
mobile computing
Mobile Applications
leak detection
Human Factors
Human behavior
Handheld computers
DroidPatrol
Conferences
computer science education
composability
Android Development Studio
biblio
A variant of the Schnorr signature using an elliptic curve over a field of characteristic two
Submitted by aekwall on Mon, 01/06/2020 - 9:37am
pubcrawl
standards
software engineering
Schnorr signature scheme
Schnorr signature
scalar multiplication
Scalability
Resiliency
public key cryptography
authentication
koblitz Curve
Elliptic curves
elliptic curve
double-and-add scalar multiplication
digital signatures
digital signature
computer science
biblio
MeetCI: A Computational Intelligence Software Design Automation Framework
Submitted by grigby1 on Mon, 12/09/2019 - 1:01pm
MeetCI
XML file
XML
tools
specific supported functionality
software implementation process
software engineering
Software design automation
Software algorithms
Software
Security Evaluation
Recurrent neural networks
recurrent neural nets
public domain software
pubcrawl
open source software framework
application design decisions
machine learning domains
machine learning
Libraries
learning (artificial intelligence)
language compatibility
expert systems
expert system
Cryptography
computational intelligence techniques
computational intelligence software design automation framework
computational intelligence libraries
computational intelligence
Compositionality
composability
CI users
biblio
CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle
Submitted by grigby1 on Wed, 10/30/2019 - 9:52am
Cryptography
Data protection by design and default
privacy by design
pubcrawl
resilience
Resiliency
Scalability
Security by Default
security by design
Software design life cycle
software engineering
biblio
Compiler-Assisted Code Randomization
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
Scalability
Prototypes
pubcrawl
randomized variants
Resiliency
return oriented programming
return-oriented programming
Robustness
Runtime
program compilers
security
security of data
Software
software distribution models
software distribution norms
software diversification
software engineering
transformation-assisting metadata
composability
applied code transformation
CCR
code randomization
code uniformity
compiler level protection
compiler-assisted code randomization
compiler-rewriter cooperation
compiler security
address space layout randomization
Compositionality
fine-grained code randomization
fine-grained code transformation
Hardware
Human behavior
LLVM compiler toolchain
metadata
Metrics
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »