Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security patterns
biblio
FireBugs: Finding and Repairing Bugs with Security Patterns
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
program debugging
Software systems
software quality
software maintenance
software design experience
software defects
security patterns
security of data
security bugs
security
Secure Software Development
Resiliency
resilience
repairing bugs
pubcrawl
Automated Secure Software Engineering
mobile computing
javax.crypto APIs
firebugs
Cryptography
Compositionality
Bug Repair
automated approach
application programming interface
application program interfaces
APIs
Android app repositories
Android (operating system)
composability
biblio
Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems
Submitted by grigby1 on Thu, 02/14/2019 - 11:22am
cross-site scripting
expert systems
pubcrawl
resilience
Resiliency
Secure File Sharing
security
security patterns
Software Architecture
System recovery
Vulnerability
biblio
Security Patterns from Intelligent Data: A Map of Software Vulnerability Analysis
Submitted by grigby1 on Thu, 08/23/2018 - 11:43am
intelligent data processing
taxonomy
software vulnerability analysis
Software Vulnerability
Software
security vulnerability
security patterns
security of data
security
pubcrawl
program analysis
Analytical models
intelligent data analysis
intelligent data
Industries
Databases
Data models
Cryptography
computational intelligence
Compositionality
composability
biblio
A classification methodology for security patterns to help fix software weaknesses
Submitted by grigby1 on Mon, 11/20/2017 - 12:22pm
Policy
web applications
software weakness fixing
software weakness
software life
Software
security weaknesses
Security weakness
security principles hierarchical organization
security principles
security patterns
security of data
Resiliency
pubcrawl
policy-based governance
authentication
pattern classification
pattern choice
Metrics
internet
Human behavior
Government
Governance
Fault tolerant systems
fault tolerance
Databases
collaboration
classification semiautomatic methodology
classification
authorization
biblio
Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection
Submitted by K_Hooper on Wed, 11/01/2017 - 11:10am
Cloud Computing
expert systems
Human behavior
pubcrawl
resilience
risk analysis
Scalability
security patterns
STRIDE-DREAD Model
threat assessment
biblio
Static and Dynamic Integrity Properties Patterns
Submitted by grigby1 on Tue, 09/19/2017 - 12:14pm
Human behavior
Metrics
natural language processing
pubcrawl
Resiliency
security patterns
software integrity
biblio
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns
Submitted by Katie Dey on Fri, 10/24/2014 - 12:52pm
Science of Security
Patterns
taxonomy
software reusability
Software
security patterns
security of data
security knowledge
security
Science of Security
requirements engineering pattern
requirements engineering
psychology
abstraction
patternmining
Pattern recognition
pattern experimentation
object-oriented methods
Natural languages
knowledge reuse
information security guidelines
formal verification
documentation
cognitive psychology
CMU
CMU