Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
source code (software)
biblio
Cross-Entropy: A New Metric for Software Defect Prediction
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
pubcrawl
Task Analysis
source code (software)
source code
software repository
software quality assurance
software quality
software metrics
software defect prediction
software bugs
Software
Semantics
recurrent neural network language model
recurrent neural nets
code metric
program debugging
predictive security metrics
Predictive models
natural language processing
Metrics
Measurement
language model
Entropy
DefectLearner
deep learning
cross-entropy
Computer bugs
code naturalness
biblio
Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques
Submitted by grigby1 on Thu, 09/26/2019 - 10:25am
resilience
tools
Text Mining
standards
SQL injection vulnerabilities
SQL injection
SQL
source code (software)
software vulnerabilities
Software
singular decision trees
security of data
security
Secure Coding
Safe Coding
Resiliency
code analysis
Python
pubcrawl
program diagnostics
policy-based governance
natural language techniques
natural language processing
Metrics
Java program
Java byte code
Java
Human Factors
Human behavior
Decision trees
collaboration
code analysis tools
biblio
A Malware Analysis and Artifact Capture Tool
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
microsoft windows
Windows
tools
Syntactics
static states
static analysis
source code (software)
sandbox
Resiliency
pubcrawl
process flow
obfuscation techniques
obfuscation
multiple code paths
Monitoring
artifact capture tool
Metrics
malware behavior
malware artifacts
Malware Analysis
malware
invasive software
interactive malware analysis
Human behavior
handwriting recognition
dynamic states
dynamic control
Disassemblers
Decompilers
debuggers
biblio
Detection of protection-impacting changes during software evolution
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
Role Based Access Control
WordPress
web applications
static analysis
source code changes
source code (software)
software maintenance
software evolution
Software
security vulnerabilities
security regression
Security Impact of Changes
role-based access control
Access Control
Resiliency
RBAC security
pubcrawl
protection-impacting changes
negative security changes
Mathematical model
maintenance engineering
Image edge detection
composability
Automated Secure Software Engineering
authorisation
application security
biblio
Hybrid Encryption for Securing SharedPreferences of Android Applications
Submitted by grigby1 on Thu, 01/31/2019 - 12:16pm
internal memory
XML
source code (software)
source code
smart phones
SharedPreferences
Shared Preference interface
Scalability
Resiliency
resilience
pubcrawl
password
Mobile Applications
Metrics
Keystore
android
hybrid encryption approach
Humanoid robots
Human Factors
Human behavior
encryption algorithm
encryption
Cryptography
confidential information
Androids
Android operating system
Android Keystore system
android encryption
Android applications
Android (operating system)
biblio
A First Look at Browser-Based Cryptojacking
Submitted by grigby1 on Mon, 11/19/2018 - 12:15pm
Monero
Google
Human behavior
internet
Java
JavaScript code
marketing data processing
Metrics
mining
financial data processing
online front-ends
pubcrawl
resilience
Resiliency
source code (software)
Web sites
website
cryptocurrency
bitcoin
blockchain
botnet
browser mining
browser-based mining
Browsers
Central Processing Unit
Coinhive
advertisement revenue
cryptocurrency Monero
Cryptography
cryptojacking
Data mining
data privacy
electronic money
ethics
biblio
The approach to finding errors in program code based on static analysis methodology
Submitted by grigby1 on Thu, 06/07/2018 - 3:12pm
semantic information
tools
testing
syntax tree
Syntactics
syntactic information
static program code analysis
static code analysis methodology
static code analysis
source code (software)
source code
software quality
Semantics
Bars
Resiliency
resilience
pubcrawl
program diagnostics
program code Error detection
increase of efficiency
Human behavior
embedded computing
efficiency improvement
diagnostic rules
composability
biblio
Predicting Fault-Prone Classes in Object-Oriented Software: An Adaptation of an Unsupervised Hybrid SOM Algorithm
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
software quality
Predictive Metrics
Predictive models
predictive security metrics
pubcrawl
self-organising feature maps
Self-Organizing Map
semisupervised fault-proneness prediction models
software metrics
Prediction algorithms
Software systems
source code (software)
supervised learning algorithms
Unsupervised Fault-Proneness Prediction
unsupervised fault-proneness prediction models
unsupervised hybrid SOM algorithm
Unsupervised Learning
Adaptation models
object-oriented software systems
object-oriented programming
Object-Oriented Metrics Threshold Values
Object oriented modeling
Naive Bayes Network
Multilayer Perceptron
Metrics
Measurement
HySOM model
function-level source code metrics
fault-prone code identification
fault-prone classes prediction model
fault data history
Data models
class-level granularity
biblio
Evaluating micro patterns and software metrics in vulnerability prediction
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
source code
pubcrawl
security
security of data
security vulnerabilities
Software
software metrics
software quality
software security
program testing
source code (software)
stand-alone Java web applications
time effective software testing
traditional class-level software metrics
traditional software metrics
vulnerability prediction model
vulnerable classes
vulnerable code
Java
Apache Tomcat
class-level patterns
class-level traceable patterns
Complexity theory
cost effective software testing
Design patterns
early detection
internet
Apache Camel
learning (artificial intelligence)
machine learning techniques
Metrics
micropatterns evaluation
Object oriented modeling
Predictive Metrics
Predictive models
predictive security metrics
biblio
Source File Set Search for Clone-and-Own Reuse Analysis
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Software reuse
Resiliency
security
security vulnerabilities
SHA-1 file hash
Software
software ecosystem
software packages
software reusability
pubcrawl
source code repositories
source code reuse
source code search
source code (software)
source files
source file set search
version control system
Android (operating system)
origin analysis
Information Reuse
Firefox source code
file clone detection
efficient file similarity computation
directory names
Debian Linux package
Debian GNU package
Data mining
Cryptography
component extraction
Cloning
clone-and-own reuse analysis
b-bit minwise hashing technique
Android source code
« first
‹ previous
1
2
3
next ›
last »