Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SBOM
file
Binary Software Composition Analysis with CodeSentry
Submitted by Katie Dey on Wed, 04/27/2022 - 7:56am. Contributors:
Antonio Flores Montoya
Drew DeHaas
Paul Anderson
Vineeth Kashyap
Abstract
Binary Analysis
N-day
SBOM
software composition analysis
vulnerabilities
HCSS'22
HCSS '22
biblio
Visibility Amp; Control: Addressing Supply Chain Challenges to Trustworthy Software-Enabled Things
Submitted by grigby1 on Mon, 11/08/2021 - 12:49pm
composability
cyberphysical
cyber physical security
cyber physical systems
devsecops
IoT
pubcrawl
resilience
Resiliency
SBOM
Software
software assurance
software bill of materials
Trustworthy Systems
biblio
A factor-searching-based multiple string matching algorithm for intrusion detection
Submitted by BrandonB on Fri, 05/01/2015 - 7:38am
network intrusion detection systems
URL blacklist
Time complexity
synthetic rules
succinct hash table
string matching
space-efficient multiple string matching algorithm BVM
space-efficient
space complexity
Snort
security of data
SBOM
SBDM
pattern matching
AC
multiple string matching
matching speed
Intrusion Detection
huge memory usage
factor-searching-based multiple string matching algorithm
factor searching-based algorithms
ClamAV
bit-vector
automata-based multiple string matching algorithms
automata theory
automata
arrays
biblio
A factor-searching-based multiple string matching algorithm for intrusion detection
Submitted by BrandonB on Thu, 04/30/2015 - 11:49am
network intrusion detection systems
URL blacklist
Time complexity
synthetic rules
succinct hash table
string matching
space-efficient multiple string matching algorithm BVM
space-efficient
space complexity
Snort
security of data
SBOM
SBDM
pattern matching
AC
multiple string matching
matching speed
Intrusion Detection
huge memory usage
factor-searching-based multiple string matching algorithm
factor searching-based algorithms
ClamAV
bit-vector
automata-based multiple string matching algorithms
automata theory
automata
arrays