Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Syntactics
biblio
Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis
Submitted by grigby1 on Tue, 11/19/2019 - 2:41pm
smart grid devices
power system
power system security
predefined vulnerability patterns
program diagnostics
resilience
Safety
security of data
security threats
power grid vulnerability analysis
Smart Grids
smart meters
smart power grids
smart terminals
Syntactics
terminal devices
terminal security
vulnerability detection
Compositionality
pubcrawl
Human behavior
composability
Resiliency
Analytical models
automatic static analysis
buffer-overflow vulnerabilities
buffer-overflow vulnerability detection
static analysis
Computer bugs
device program information
error reporting
feature extraction
Metrics
modern power transmission network
power engineering computing
biblio
Weak-Assert: A Weakness-Oriented Assertion Recommendation Toolkit for Program Analysis
Submitted by aekwall on Mon, 08/26/2019 - 9:07am
program weakness
tools
testing
Syntactics
Software
security weaknesses
security
resilience
pubcrawl
assertion recommendation
program testing
policy-based governance
pattern matching
Metrics
Human behavior
Hardware
formal program verifcation
biblio
A Malware Analysis and Artifact Capture Tool
Submitted by aekwall on Mon, 06/24/2019 - 1:41pm
microsoft windows
Windows
tools
Syntactics
static states
static analysis
source code (software)
sandbox
Resiliency
pubcrawl
process flow
obfuscation techniques
obfuscation
multiple code paths
Monitoring
artifact capture tool
Metrics
malware behavior
malware artifacts
Malware Analysis
malware
invasive software
interactive malware analysis
Human behavior
handwriting recognition
dynamic states
dynamic control
Disassemblers
Decompilers
debuggers
biblio
Detecting the Use of Unsafe Data in Software of Embedded Systems by Means of Static Analysis Methodology
Submitted by grigby1 on Fri, 02/22/2019 - 3:10pm
pubcrawl
unsafe data
Syntactics
syntactic information
static program code analysis
static code analysis
static analysis methodology
static analysis
software quality
Semantics
semantic information
Resiliency
composability
program diagnostics
program code
potentially unsafe data
Indexes
increase of efficiency
Human behavior
embedded systems
embedded computing
diagnostic rules
Containers
biblio
Exploiting Linguistic Style as a Cognitive Biometric for Continuous Verification
Submitted by grigby1 on Fri, 02/22/2019 - 3:02pm
lexical levels
Training
text analysis
Syntactics
stylometry
semantic levels
pubcrawl
pattern classification
one-class classification problem
one class
natural language processing
Metrics
Linguistics
linguistic style
authorial style
learning (artificial intelligence)
Isolation Forests
Human behavior
formal verification
Forestry
feature extraction
continuous verification
cognitive biometric
cognition
biometrics (access control)
biometrics
authorship
biblio
The approach to finding errors in program code based on static analysis methodology
Submitted by grigby1 on Thu, 06/07/2018 - 2:12pm
semantic information
tools
testing
syntax tree
Syntactics
syntactic information
static program code analysis
static code analysis methodology
static code analysis
source code (software)
source code
software quality
Semantics
Bars
Resiliency
resilience
pubcrawl
program diagnostics
program code Error detection
increase of efficiency
Human behavior
embedded computing
efficiency improvement
diagnostic rules
composability
biblio
Rendering Trustability to Semantic Web Applications-Manchester Approach
Submitted by grigby1 on Mon, 03/26/2018 - 11:55am
Resiliency
Web pages
web of trust
University Ontology
Trusted Computing
trustability
trust
Syntactics
Semantics
semantically annotated tags
semantic Web documents
semantic Web applications-manchester approach
Semantic Web
composability
resilience
pubcrawl
Provenance
OWL
Ontology
ontologies (artificial intelligence)
Ontologies
Manchester Syntax
Intelligent web
intelligent knowledge retrieval
information retrieval
Data models
biblio
Misclassifications: The Missing Link
Submitted by grigby1 on Mon, 03/19/2018 - 12:37pm
missing link
writing style moulds
Writing
Training
text analysis
Syntactics
Support vector machines
stylometry
stylometric cues
statistical methods
statistical analysis
recommender systems
recommendation system
pubcrawl
proximity
author attribution problem
misclassified books
misclassifications
Metrics
literary style
Length measurement
learning (artificial intelligence)
Human behavior
feature extraction
Electronic mail
domain experts
classification
book similarity
authors
biblio
Verifying and Synthesizing Constant-Resource Implementations with Types
Submitted by K_Hooper on Wed, 02/28/2018 - 10:31am
programs verification
type inference algorithm
timing channels
Syntactics
static analysis
standards
side channel attacks
Semantics
resource-aware noninterference
resource consumption
resource aware ML
resource analysis
resource allocation
pubcrawl
AARA
programming
program verification
language-based security
information flow tracking
Information Flow
inference mechanisms
encryption
Cryptography
constant-resource behavior implementations
Compositionality
cognition
automatic amortized resource analysis
biblio
Efficient and Flexible Discovery of PHP Application Vulnerabilities
Submitted by grigby1 on Thu, 02/15/2018 - 10:44am
PHP application vulnerabilities
web applications
vulnerability scanner
Syntactics
Structured Query Language
SQL injection
Servers
security
Scalability
Resiliency
resilience
pubcrawl
Programming Language
programming
code property graphs
PHP
Open Source Software
interprocedural analysis technique
internet
information flow analysis
Human Factors
human factor
Human behavior
graph theory
graph database
Databases
Cross Site Scripting (XSS)
Cross Site Scripting
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »