Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Java
biblio
Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
Submitted by grigby1 on Fri, 07/10/2020 - 1:07pm
Human Factors
Web sites
Web browser fingerprinting
Unsupervised Learning
static analysis
Resiliency
resilience
pubcrawl
Metrics
malicious JavaScript codes
Java
internet
in-browser cryptojacking
code complexities
Human behavior
economic analysis
dynamic analysis
dropzone cryptojacking server
cryptojacking scripts
cryptojacking attackers
cryptojacking
Cryptography
computer network security
codes
code-based categorization
biblio
Agile Release Planning Using Natural Language Processing Algorithm
Submitted by aekwall on Mon, 05/18/2020 - 10:54am
agile release planning
word corpus
user story
team working
software prototyping
similar user stories
RV coefficient NLP algorithm
Release Planning
Rally
R Programming
provided user stories
project release
natural language processing algorithm
JIRA
Java utility
complex software engineering projects
Scalability
agile methodology
project management
Algorithm
Currencies
Software algorithms
Java
software development management
software engineering
natural language processing
Planning
pubcrawl
Human behavior
Resiliency
Software
biblio
Raising the Bar Really High: An MTD Approach to Protect Data in Embedded Browsers
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
MTD
browser-based vulnerabilities
computing systems security
file servers
HTML
Internet users privacy
JavaScript injection attacks
mobile
Mobile Application
mobile operating systems
mobile WebViews
moving target defense
apps
MTD approach
server-side moving target defense technique
UI component
user interfaces
Web
Web browsers safety
Web pages
WebView-Embedded app
WebViews
Web Browser Security
smart phones
security
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
privacy
internet
composability
mobile computing
security of data
online front-ends
Data protection
Cyber Attacks
Java
Metrics
Browsers
Compositionality
operating systems (computers)
operating systems
android
biblio
Research on Cloud Workflow Engine Supporting Three-Level Isolation and Privacy Protection
Submitted by grigby1 on Fri, 04/17/2020 - 10:24am
jBPM4 engine
workflow management software
workflow engine
virtualization privacy
three-level isolation
Resiliency
resilience
pubcrawl
privacy protection
privacy
Metrics
mass tenant workflow instances
business data processing
Java
Human Factors
Human behavior
data privacy
composability
cloud workflow systems
cloud workflow model
cloud workflow engine
cloud workflow
Cloud Computing
ceramic cloud service platform
biblio
SafeCheck: Safety Enhancement of Java Unsafe API
Submitted by grigby1 on Fri, 03/27/2020 - 11:29am
Resiliency
memory safety
Metrics
openJDK bug system
policy-based governance
program debugging
Programming Language
pubcrawl
resilience
Memory Protection
Runtime
Safe Coding
Safety
safety enhancement
security of data
storage management
tools
unsafe crash patterns
Java core library
bytecode
bytecode verification
collaboration
Computer bugs
dynamic analysis
Human behavior
Human Factors
Java
application program interfaces
Java runtime
Java unsafe API
JVM crash
Libraries
low- level system code
Memoey Safety
memory checker
biblio
DifFuzz: Differential Fuzzing for Side-Channel Analysis
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
dynamic analysis
predictability
Security Heuristics
unknown side-channel vulnerabilities
secret-dependent paths
secret program data
resource-guided heuristics
resource usage
resource consumption
Performance analysis
Java programs
fuzzing-based approach
DifFuzz
differential fuzzing
side-channel attacks
side-channel analysis
security of data
fuzzing
side-channel
Time factors
Instruments
execution time
program diagnostics
Java
Correlation
tools
vulnerability detection
pubcrawl
Resiliency
Cryptography
Scalability
biblio
A Proposed Approach to Build an Automated Software Security Assessment Framework using Mined Patterns and Metrics
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
security-specific properties
mined patterns
Patterns
pubcrawl
reliable software
Resiliency
Scalability
secure code
security
security of data
security-centric
Metrics
Software
software metrics
software security
software security level
Software Vulnerability
text analysis
tools
Ubiquitous Computing Security
Vulnerability prediction
Data mining
Security Metrics
automated framework
Automated Secure Software Engineering
automated software security assessment framework
building security-specific metrics
coding theory
Complexity theory
composability
current software metrics
Computing Theory
encoding
estimated security level
existing nanopatterns
generic patterns
graph theory
Human Factors
Java
Java method-level traceable patterns
machine learning
biblio
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
alphanumeric password system
twofish encryption and visual cryptography method
Twofish encryption
two factor authentication
TEVC method
TEVC encryption algorithm
password protections
message code confirmation
Java platform
Graphical Password authentication
Graphical Password
fingerprint scan
dual authentication process
authentication method
authorisation
secure authentication
data communication
Human Factors
data visualisation
computational complexity
encryption
visual cryptography
Java
message authentication
Data protection
internet
pubcrawl
Cryptography
biblio
Identification of the Impacts of Code Changes on the Security of Software
Submitted by aekwall on Mon, 02/10/2020 - 12:09pm
electronic commerce
software assurance
software lifetime
software code
security state
security assurance cases
security assurance case
security assessment time
open-source ERP software application
open-source e-commerce software application
Open Source Software
monitored security functions
incremental development
enterprise resource planning
code change impact
assurance case elements
Monitoring
security requirements
Scalability
safety-critical software
Java
code review
source code (software)
software maintenance
Unified modeling language
public domain software
tools
software security
composability
pubcrawl
security
biblio
A Comparative Analysis of Static Code Analysis Tools That Check Java Code Adherence to Java Coding Standards
Submitted by grigby1 on Mon, 02/10/2020 - 11:34am
Java programming language
testing
style
static code analysis tool
static code analysis
static analysis
standards
software quality
software maintenance
software development
Resiliency
resilience
quality
pubcrawl
program diagnostics
JPL Coding Standards
Concurrency
Java Coding Standards Enforcing Tools
Java code analysis
Java code adherence
Java
International Java Coding Standards
Human behavior
exceptions
critical system
concurrency (computers)
composability
Comparative Analysis
Coding Standard Analyzers
analyzers
security
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »