Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Syntactics
biblio
Secure Compilation and Hyperproperty Preservation
Submitted by grigby1 on Wed, 01/10/2018 - 11:19am
Safety
untyped target language
typed source language
Type theory
trace-preserving compilation
TPC
Syntactics
standards
Semantics
Security Properties
security of data
security
secure compilers
secure compilation
safety hyperproperties
coding theory
Resiliency
pubcrawl
program verification
Program processors
program compilers
low-level attack capabilities
hyperproperty preservation
fully abstract compiler
correctness criterion
Concrete
composability
compiler security
compiled program
biblio
A scientific data provenance harvester for distributed applications
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
pubcrawl
Metrics
Performance
performance measurements
prestage provenance
process history
ProvEn
Provenance
Provenance Environment
provenance related information
provenance store
internet
relational databases
Resiliency
Science Integrated end-to-end Performance Prediction
scientific applications
scientific data provenance harvester
scientific information systems
Syntactics
tabular job management provenance
US Department of Energy Office of Science
electronic data interchange
Accelerated Climate Modeling
Accelerated Climate Modeling for Energy project
Atmospheric measurements
Atmospheric modeling
Biological and Environmental Research
cognitive science
composability
data analysis
Data models
Distributed Applications
Earth System Modeling program
Energy project
environmental factors
experimental rationale
Extreme Scientific Workflows project
file based evidence
HAPI
Harvester Provenance Application Interface syntax
harvesting
Human behavior
file
Khalaj_Impact_Analysis.pdf
Submitted by Jamie Presken on Mon, 12/05/2016 - 1:33pm
Abstracts
Apr'15
CMU
Computational modeling
Context
Microwave integrated circuits
Runtime
Syntactics
biblio
Impact Analysis based on a Global Hierarchical Object Graph
Submitted by Jamie Presken on Mon, 12/05/2016 - 1:33pm
Abstracts
Apr'15
CMU
Computational modeling
Context
Microwave integrated circuits
Runtime
Syntactics
CMU
Apr'15
biblio
Malicious data classification using structural information and behavioral specifications in executables
Submitted by BrandonB on Tue, 05/05/2015 - 10:55am
Software
malwares
NtTrace
obfuscation technology
pattern classification
program diagnostics
security devices
signature database
signature-based detection system
malware detection system efficiency improvement
static analysis
structural information
Syntactics
system calls
threat detection
threat mitigation
underground Internet economy
zero-day malware detection
internet
antivirus
automated malicious programs
behavioral specifications
Classification algorithms
dynamic analysis
executable file
feature extraction
Information systems
Algorithm design and analysis
invasive software
malicious behavior extraction
malicious data classification
malicious software detection
malicious software mitigation
malware
malware detection
malware detection system effectiveness improvement
biblio
Preventing Client Side XSS with Rewrite Based Dynamic Information Flow
Submitted by BrandonB on Tue, 05/05/2015 - 9:49am
Semantics
JavaScript abstract syntax tree
JavaScript code
JSTFlow
online front-ends
performance overhead
rewrite based dynamic information flow
security
security of data
JavaScript
sensitive information leaks
Syntactics
taint engine
taint model
tainted information flow
web applications
XSS attacks
abstract intermediate representation
Java
internet
information security
information flow tracking framework
information flow analysis
fine-grained isolation
Engines
Data models
data flow analysis
cross-site scripting
code rewrite
client side XSS
Browsers
browser proxy
Abstracts
biblio
Institution Theory for Services Oriented Applications
Submitted by BrandonB on Fri, 05/01/2015 - 7:09am
Manganese
workflow applications
Unified modeling language
UML AD
UML activity diagram
System recovery
Syntactics
software engineering
service oriented applications
Semantics
semantic correctness
programming language semantics
Model transformation
Context
local semantic
institution theory
institution comorphism
Graphical Model
Grammar
formal verification
Formal Specification
Formal semantics
event-B specification
Event-B
diagrams
biblio
Using sentiment to detect bots on Twitter: Are humans more opinionated than bots?
Submitted by BrandonB on Thu, 04/30/2015 - 12:42pm
Twitter network
Twitter applications
Twitter
Trusted Computing
Syntactics
social networking (online)
sentiment-related factors
Semantics
principal component analysis
Nominations and elections
Indian election
Conferences
bot detection
AUROC
area under the ROC curve
« first
‹ previous
1
2
3
4
5
6
7