Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software engineering
biblio
Watchman: Monitoring Dependency Conflicts for Python Library Ecosystem
Submitted by aekwall on Mon, 02/08/2021 - 1:40pm
Monitoring
Scalability
Resiliency
pubcrawl
Metrics
tools
Libraries
automation
Python
software engineering
Ecosystems
software ecosystem
Human Factors
Compositionality
Cyber Dependencies
dependency conflicts
biblio
Establishing Trust in Binary Analysis in Software Development and Applications
Submitted by aekwall on Mon, 02/01/2021 - 11:41am
Binary codes
vulnerability reports
source security
software programmer trust
security vulnerability minimization
knowledge elicitations
knowledge acquisition
implementation risk assessment
binary release metadata
binary component
binary code components
binary code behavior
binary analysis tools
binary analysis techniques
human trust
security of data
binary code
data loss
trust
Binary Analysis
software development
software engineering
computer security
Libraries
tools
standards
pubcrawl
Human behavior
Trusted Computing
Software
biblio
CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIs
Submitted by grigby1 on Wed, 01/20/2021 - 4:20pm
interactive systems
software engineering
security
Resiliency
resilience
pubcrawl
online information sources
Java Cryptography Architecture
Java
internet
interactive Web platform
API
Data mining
Cryptography
cryptographic APIs
CryptoExplorer
Compositionality
code analysis
application programming interface
application program interfaces
APIs
biblio
Fluid Intelligence Doesn't Matter! Effects of Code Examples on the Usability of Crypto APIs
Submitted by grigby1 on Wed, 01/20/2021 - 4:20pm
Libraries
usability
Task Analysis
software engineering
security
Resiliency
resilience
pubcrawl
Particle measurements
API
intelligence
Example Code
Cryptography
Computer bugs
Compositionality
application programming interface
APIs
biblio
An Improved Collaborative Filtering Recommendation Algorithm Based on Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 1:40pm
gradient methods
ε-differential privacy
stochastic gradient descent algorithm
recommendation systems
recommendation accuracy loss
potential characteristic matrix
noise matrix factorization model
Netflix
MovieLens
differential privacy matrix factorization model
differential privacy constraint
collaborative filtering recommendation model
centralized recommendation
matrix factorization
Matrix decomposition
differential privacy protection
Scalability
Perturbation methods
recommender systems
privacy protection
differential privacy
Predictive models
software engineering
Stochastic processes
Prediction algorithms
privacy
collaborative filtering
composability
pubcrawl
Human behavior
Resiliency
data privacy
biblio
Research on Trusted Authentication Model and Mechanism of Data Fusion
Submitted by aekwall on Mon, 12/07/2020 - 12:23pm
software engineering
Predictive Metrics
pubcrawl
Resiliency
Scalability
sensor fusion
service model
ship cluster platform
ships
neural style transfer
system design framework
system requirements
Trusted Authentication
trusted authentication model
Trusted Computing
trusted platform modules
unified authentication platform
database design
authorisation
CAS
composability
cyber-physical system security
data fusion
Data integration
Data mining
Data models
authentication
Databases
information fusion
JA-SIG CAS
marine engineering
Marine vehicles
Media
message authentication
biblio
A Theoretical Review: Risk Mitigation Through Trusted Human Framework for Insider Threats
Submitted by grigby1 on Tue, 12/01/2020 - 1:59pm
Personnel
trusted human framework
Trusted Computing
software engineering
security of data
risk mitigation
risk management
pubcrawl
potential employees
cyclic process
People Process and Technology
on-going process
insider threats risk
Insider Threats
human trust
Human behavior
enterprise risk management activities
biblio
Trust Beyond Computation Alone: Human Aspects of Trust in Blockchain Technologies
Submitted by grigby1 on Tue, 12/01/2020 - 1:59pm
Human Aspects
Trusted Computing
trust
transaction transparency
software engineers
software engineering
pubcrawl
institutional aspects
Immutability
human trust
Human behavior
bitcoin
Guidelines
Distributed databases
Cryptography
cryptographic verifiability
cryptocurrency
computational trust
blockchain-based systems
blockchain technologies
blockchain
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 2:41pm
OWASP
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
information confidentiality
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
software engineering
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
security of data
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
biblio
Mobile bootloader with security features
Submitted by grigby1 on Tue, 11/17/2020 - 2:40pm
program testing
Operating systems security
software design
security features
modern mobile operating systems
mobile development
mobile bootloader
excessive information
device internal storage
described problem
bootloading stage
bootloader
Booting
Software Testing
security of data
operating systems (computers)
resilience
software engineering
computer security
smart phones
mobile computing
composability
information security
Cryptography
Resiliency
Metrics
pubcrawl
system logs
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »