Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software engineering
biblio
A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems
Submitted by grigby1 on Wed, 10/02/2019 - 2:55pm
Resiliency
viable systems security analysis approach
traceable security
technology reliant environment
system-theoretic process analysis approach
systems security engineering
systems security analysis
STPA-Sec
software engineering processes
software engineering
security processes
security of data
security architecture analysis approaches
resiliency requirements
architectural-level engineering considerations
resilience
requirements analysis
readily understandable description
pubcrawl
key architectural analysis definitions
functional-level security requirements
Formal Specification
eliciting security requirements
design-level security criteria
dependably secure systems
cyber-physical systems
complex cyber-physical systems
biblio
A Parallel Proof of Work to Improve Transaction Speed and Scalability in Blockchain Systems
Submitted by grigby1 on Fri, 06/28/2019 - 10:37am
nonce
transactions
transaction verification process
transaction speed
solo mining
software engineering
scalable verification
Scalability
reward system
Resiliency
resilience
pubcrawl
Proof of Work
parallel processing
parallel mining
bitcoin
Metrics
financial sector
financial data processing
distributed ledger
distributed consensus
Data mining
cryptocurrency
cryptocurrencies
Compositionality
blockchain systems
blockchain
Bitcoin mining
Bitcoin cryptocurrency
biblio
Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed
Submitted by willirn1 on Fri, 05/31/2019 - 10:41am
resilience
hardware-in-the-loop simulation testbed
HIL testbed
model based software development framework
Model Integrated Computing
physical components
physical system
platform specific performance measurements
railway transportation system
hardware-in-the-loop
security of data
simulation environment
Software
software engineering
system functions
testbed
Vanderbilt
vulnerability assessment
cyber-attack effect evaluation
actuation capability
Analytical models
Computational modeling
computer architecture
computer security
CPS attack experiments
cyber components
cyber physical systems
System-security co-design
cyber-physical system
cyber-physical systems
cybersecurity design process
embedded computers
embedded systems
Experimentation
Hardware
hardware-in-the loop simulation
biblio
Balancing Organizational Incentives to Counter Insider Threat
Submitted by aekwall on Wed, 05/08/2019 - 9:47am
positive incentives
negative incentives
organisational aspects
organizational aspects
organizational context
organizational supportiveness
Organizations
perceived organizational support
Personnel
Monitoring
psychology
pubcrawl
resilience
security of data
sociotechnical systems
software engineering
traditional security practices
workforce management practices
Engagement
balanced combination
balances organizational incentives
balancing organizational incentives
best practices
computer security
contracts
dysfunctional management practices
employee welfare
authorisation
Human behavior
human resources management
insider threat
insider threat program
insider wrongdoing
Metrics
missing dimension
biblio
Self-protection of Android Systems from Inter-component Communication Attacks
Submitted by aekwall on Mon, 03/04/2019 - 10:50am
Resiliency
pubcrawl
composability
Android security
Self-protecting system
software engineering
Automated Secure Software Engineering
biblio
Automating Threat Intelligence for SDL
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
open source threat information sources mining
Automated Secure Software Engineering
vulnerability disclosure
threat intelligence
tactical threat intelligence
Stakeholders
security development lifecycle
security community
SDL
product specific threat indicators
product security
product development
Product design
product deployment
security of data
IT infrastructure
Feeds
enterprise information technology infrastructure
software engineering
Data mining
Databases
composability
pubcrawl
Resiliency
security
malware
Conferences
biblio
CoderChain: A BlockChain Community for Coders
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
blockchain community
Automated Secure Software Engineering
software related knowledge
software development community
online community
knowledge contribution
Distributed databases
cryptocurrencies
CoderChain
code review
code assessment
Conferences
blockchain based database
software engineering
knowledge based systems
computer security
Handheld computers
blockchain
composability
pubcrawl
Resiliency
biblio
Threat Extraction Method Based on UML Software Description
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
knowledge based systems
Automated Secure Software Engineering
Unified modeling language
UML software description
threat knowledge base
threat extraction method
Software systems
software system
software development
software behavior
software application
sequence diagram
security relevant attributes
Threat Modeling
human knowledge
Extracting threats
software engineering
Databases
software security
Computational modeling
composability
pubcrawl
Resiliency
security
security of data
biblio
Software Ecosystem Call Graph for Dependency Management
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
popular form
ecosystem-level
Ecosystems
Equifax data breach
external libraries
fine-grained dependency network
impact
indicative information
leftpad package removal
open source software libraries
packages
developers
program analysis
public domain software
software development management
software ecosystem
software libraries
software reusability
Software reuse
workspace
Automated Secure Software Engineering
call graphs
security
Software
Resiliency
pubcrawl
composability
tools
Libraries
software engineering
automated tools
security of data
centralized code repositories
client-server systems
Computer bugs
core package
counter measure
dependencies
dependency checkers
Dependency management
dependency networks
biblio
DLR Secure Software Engineering
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
data-science
Automated Secure Software Engineering
static analysis
software engineering
software development process
software automated security evaluation
self-developed software
secure-software-engineering
research organization
Provenance
IT-security
information sources
DLR secure software engineering
security of data
data-oriented approach
code-analysis
Aerospace engineering
Attack vectors
tools
composability
pubcrawl
Resiliency
Software
security
Conferences
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »