Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Java
biblio
RPC Based Framework for Partitioning IoT Security Software for Trusted Execution Environments
Submitted by aekwall on Mon, 11/09/2020 - 12:19pm
side-channel attacks
Information Reuse and Security
trusted execution environments
TEE integration time
software partitioning
RPC-based solutions
RPC-based framework
RPC based framework
RPC
remote procedure calls
partitioning security components
partitioning
IoT security software
interface definition language files
graphical user interface
graphical user interfaces
security of data
framework
TEE
Compositionality
information security
Java
software engineering
Python
Libraries
pubcrawl
Resiliency
Protocols
security
IoT devices
Internet of Things
Servers
biblio
A Comparison of Nano-Patterns vs. Software Metrics in Vulnerability Prediction
Submitted by grigby1 on Wed, 11/04/2020 - 12:36pm
program testing
web services
vulnerable methods
vulnerable code
vulnerability prediction models
Vulnerability
vulnerabilities
software security
software quality
software metrics
Software
security of data
security
pubcrawl
Complexity theory
Predictive models
Object oriented modeling
nanopatterns
nano-pattern
metrics testing
Metrics
method-level traceable patterns
method-level software metrics
Measurement
learning (artificial intelligence)
Java
internet
biblio
Using Software Metrics for Predicting Vulnerable Code-Components: A Study on Java and Python Open Source Projects
Submitted by aekwall on Mon, 11/02/2020 - 1:46pm
Python vulnerable function prediction
vulnerability predictors
vulnerability prediction performance
Vulnerability prediction
testing
software security
software reliability
software projects
software metrics-based vulnerability prediction
software metrics
security vulnerabilities
security of data
security
safety-critical software
code component
Python open source projects
Python
public domain software
pubcrawl
Metrics
metrics testing
Measurement
machine learning
learning (artificial intelligence)
Java vulnerable functions
Java projects
Java
code-component
biblio
Security Checking Experiments with Mobile Services
Submitted by grigby1 on Mon, 11/02/2020 - 10:39am
mobile services
software security
software behavior
Software
security of data
security checking experiments
security checking
security
Scalability
pubcrawl
program verification
Androids
mobile computing
JPF-mobile
Java Path Finder verifier
Java
input/output parameters
i/o systems security
i-o systems security
Humanoid robots
Electron devices
automata
biblio
XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
attack vector
Cross Site Scripting
XSStudent
URL
universities
phishing attacks
instant access
direct access
Cross-site Scripting Attacks
controlled attack
Beef software
BeEF
Scalability
Educational institutions
JavaScript code
XSS
QR code
Java
internet
Computer crime
pubcrawl
Human behavior
Resiliency
biblio
SWAN\_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods
Submitted by aekwall on Mon, 09/28/2020 - 10:33am
novel automated machine-learning approach SWAN
software metrics
graphical user interfaces
machine-learning
active machine learning
authentication methods
bug detection
code-specific methods
IntelliJ plugin
program debugging
program analysis
security-relevant methods
semiautomated detection
SRM
static analysis tools
SWAN\_ASSIST aids developers
SWAN\_ASSIST tool
time exactly those methods whose classification best impact
machine learning
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
vulnerability detection
Training
Libraries
security
authentication
public domain software
software maintenance
Automated Secure Software Engineering
Java
program diagnostics
software quality
biblio
Mathematical Methods Applied for Authorship Attribution on the Phonological Level
Submitted by grigby1 on Fri, 08/28/2020 - 11:22am
mathematical methods
text analysis
statistical methods
statistical analysis
Speech recognition
speech processing
Software
Reliability
pubcrawl
phonological level
natural language processing
Metrics
attribution
Linguistics
Java
hypothesis method
Human behavior
Frequency conversion
consonant phoneme group
composability
complex analysis method
authorship attribution
authorial text differentiation
authorial differentiation of texts
biblio
The Software for Authorship and Style Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 11:22am
programming languages
Vocabulary
transcription variants
transcription symbols
text transforming
text analysis
style attribution
statistical analysis
Software
pubcrawl
attribution
phonostatistical structure
Metrics
Java programming language
Java
information science
Human behavior
gaussian distribution
composability
authorship attribution
biblio
A gateway to easily integrate simulation platforms for co-simulation of cyber-physical systems
Submitted by grigby1 on Thu, 07/16/2020 - 10:56am
pubcrawl
Java
Large-scale systems
Libraries
Logic gates
Metrics
National Institute of Standards and Technology co-simulation platform
NIST co-simulation platform
Object oriented modeling
interacting physical components
Research Infrastructure
resilience
Resiliency
simulations
Software Architecture
standards
Universal CPS Environment
CPS modeling
high-level architecture standard
high level architecture
functional mock-up interface
distributed simulation
distributed processing
digital simulation
cyber-physical systems
CPS conceptual design
computer architecture
Computational modeling
composability
communication libraries
co-simulation expertise
co-simulation
simulation
biblio
Privacy Token Technique for Protecting User’s Attributes in a Federated Identity Management System for the Cloud Environment
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
cloud environment
user privacy in the cloud
user attributes protection
SPs
Services and user’s privacy
pseudonymous technique
pseudoattributes values
privacy token technique
Privacy Token
personal identifiable information
Java programming language
federated identity management system
CloudAnalyst simulation
attributes privacy protection
Cloud Computing
privacy risks
Scalability
cloud
Java
service providers
risk management
Data protection
Metrics
privacy
pubcrawl
Resiliency
authorisation
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »