Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software security
biblio
VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS
Submitted by grigby1 on Mon, 06/10/2019 - 1:55pm
privacy
vulnerable-patched functions
vulnerable functions
vulnerability types
Vulnerability
VMPBL
tools
source files
software security
Software
security of data
security
Resiliency
resilience
real-world CWE vulnerabilities
pubcrawl
binary comparison
patched information
patch file
open source code
machine learning algorithms
machine learning
learning (artificial intelligence)
knowledge database
K-Trace algorithm
feature extraction
database management systems
composability
commas software security
Classification algorithms
binary comparison technique
biblio
Data Breach and Multiple Points to Stop It
Submitted by aekwall on Wed, 05/08/2019 - 9:46am
Access Control
Human behavior
pubcrawl
Metrics
insider threat
Anomaly Detection
software security
resilience
Data Breach
data loss prevention
inadvertent data leak
multiple point of prevention
Ransomware
Security Practices
system security
biblio
Towards Data-driven Vulnerability Prediction for Requirements
Submitted by aekwall on Mon, 03/04/2019 - 10:50am
Resiliency
pubcrawl
composability
information retrieval
software requirements
software security
Software Vulnerability
Traceability
Vulnerability prediction
Automated Secure Software Engineering
biblio
Threat Extraction Method Based on UML Software Description
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
knowledge based systems
Automated Secure Software Engineering
Unified modeling language
UML software description
threat knowledge base
threat extraction method
Software systems
software system
software development
software behavior
software application
sequence diagram
security relevant attributes
Threat Modeling
human knowledge
Extracting threats
software engineering
Databases
software security
Computational modeling
composability
pubcrawl
Resiliency
security
security of data
biblio
A Preliminary Structure of Software Security Assurance Model
Submitted by grigby1 on Mon, 02/25/2019 - 3:17pm
security challenges
software assurance
Vendors
systematic mapping study
systematic literature review
SSAM model
software security contributions
software security assurance model
software engineering
software development methodologies
software development life cycle
SMS
security of data
secure software
SDLC
GSD vendor organisations
global software development vendors
Global Software Development
empirical study
case study
software security
composability
Scalability
pubcrawl
biblio
AEON: Android Encryption Based Obfuscation
Submitted by grigby1 on Thu, 01/31/2019 - 12:15pm
android encryption
Android security
Human behavior
Human Factors
Metrics
Mobile Security
obfuscation
pubcrawl
resilience
Resiliency
Scalability
software security
biblio
Discovering Software Vulnerabilities Using Data-flow Analysis and Machine Learning
Submitted by grigby1 on Mon, 01/21/2019 - 12:16pm
Compositionality
Cross Site Scripting
data-flow analysis
Human behavior
machine learning
Metrics
pubcrawl
Resiliency
Scalability
software security
static code analysis
vulnerability detection
biblio
Market-based Security for Distributed Applications
Submitted by grigby1 on Wed, 09/05/2018 - 10:51am
security
software security
game theory
Human behavior
Scalability
resilience
Resiliency
Human Factors
Control Theory
financial derivatives
smart contracts
biblio
Most Websites Don'T Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security
Submitted by K_Hooper on Wed, 05/09/2018 - 11:00am
Security Risk Management
Browser Security
pubcrawl
Resiliency
Scalability
Security by Default
software security
web security and privacy
biblio
Dynamic Loader Oriented Programming on Linux
Submitted by K_Hooper on Wed, 05/02/2018 - 10:45am
Address Space Layout Randomization Determinism
composability
Dynamic Loader
glibc
Linux
Loader Oriented Programming
Metrics
pubcrawl
Software Exploitation
software security
Software Vulnerability
taint analysis
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »