Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Java
biblio
Static Analysis Warnings and Automatic Fixing: A Replication for C\# Projects
Submitted by aekwall on Thu, 02/02/2023 - 4:23pm
static code analysis
Human behavior
Resiliency
composability
C\# languages
codes
Computer languages
Conferences
Java
programming
pubcrawl
static analysis
biblio
Broadening Horizons of Multilingual Static Analysis: Semantic Summary Extraction from C Code for JNI Program Analysis
Submitted by aekwall on Sun, 10/16/2022 - 6:26pm
static analysis
Operational analysis
Multilingual Program Analysis
Language Interoperability
Java native interface
• Software and its engineering → Automated static analysis
static code analysis
Computer bugs
software engineering
Reliability
Java
Semantics
composability
Human behavior
Resiliency
pubcrawl
feature extraction
biblio
Static source code metrics and static analysis warnings for fine-grained just-in-time defect prediction
Submitted by aekwall on Sun, 10/16/2022 - 6:25pm
Measurement
Predictive models
pubcrawl
Resiliency
Human behavior
composability
Java
static analysis
Labeling
software quality
software metrics
Computer bugs
static code analysis
biblio
A QoS-based Evaluation of SDN Controllers: ONOS and OpenDayLight
Submitted by aekwall on Fri, 08/26/2022 - 12:08pm
delay
packet loss.
Opendaylight
Onos
Jitter
distributed controllers
D-ITG
Mininet
network topology
coupled congestion control
Packet loss
Java
Industries
Resiliency
Scalability
pubcrawl
SDN
performance evaluation
quality of service
biblio
Design and Implementation of Task Driven Communication System with Multi-user Authority
Submitted by grigby1 on Fri, 08/26/2022 - 11:23am
Java
task driven
multi-user rights
high concurrency
Communication Systems
Concurrency
Instruction sets
communication system
Metrics
security
Smart Grids
composability
Hardware
Software
Resiliency
resilience
pubcrawl
biblio
Inter-Language Static Analysis for Android Application Security
Submitted by aekwall on Fri, 08/12/2022 - 4:08pm
Conferences
tools
static analysis
pubcrawl
Mobile Security
malware
Java
Inter-language
Information systems
data-flow analysis
static code analysis
Computer Software and Theory
composabiity
Binary Analysis
application security
android
Resiliency
composability
Human behavior
biblio
A Model-Driven Framework for Security Labs using Blockchain Methodology
Submitted by aekwall on Fri, 07/29/2022 - 4:28pm
composability
object oriented security
Meta Modeling
MDA
Automatic Code Generation
Sirius tool
Acceleo
documentation
Java
Transforms
Resiliency
Metrics
pubcrawl
Conferences
tools
data privacy
blockchain
biblio
µSE: Mutation-Based Evaluation of Security-Focused Static Analysis Tools for Android
Submitted by grigby1 on Thu, 07/28/2022 - 2:06pm
Robustness
tools
Testing strategies
testing
static analysis
software engineering
Software
security and privacy
security
composability
Resiliency
resilience
pubcrawl
privacy
Open Source Software
Java
Human behavior
biblio
Performance Analysis of the Quantum Safe Multivariate Polynomial Public Key Algorithm
Submitted by grigby1 on Thu, 07/14/2022 - 6:13pm
Metrics
secure secret exchange
PQC
polynomial root finding
polynomial factoring
Multivariate Polynomial Public Key
MPPK
mathematical models
random key generation
Post-quantum cryptography
public key cryptography
pubcrawl
Java
Benchmark testing
quantum computing
NIST
Scalability
Conferences
Resiliency
resilience
Human behavior
biblio
Research on Key Technology of Software Intellectual Property Protection
Submitted by grigby1 on Wed, 06/08/2022 - 10:19am
pubcrawl
policy-based governance
resilience
Resiliency
Heuristic algorithms
composability
Java
Software algorithms
reverse engineering
intellectual property
software protection
intellectual property security
obfuscation
codes
software intellectual property protection
SOPM
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »