Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Java
biblio
Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and Solutions
Submitted by grigby1 on Fri, 02/22/2019 - 3:11pm
relational database security
Trademarks
tools
static code analysis
Static Analysis Tool
static analysis
SQL
security vulnerabilities
security of data
security
scalable static analysis
Resiliency
relational databases
applications code
pubcrawl
program diagnostics
PL/SQL server stack
Metrics
low false positives
Java EE
Java
Human behavior
Databases
Conferences
composability
C/C++ systems code
biblio
Understanding Developers' Needs on Deprecation As a Language Feature
Submitted by grigby1 on Fri, 02/08/2019 - 3:10pm
API
APIs
Compositionality
deprecation
Java
pubcrawl
resilience
Resiliency
biblio
Applications for detecting XSS attacks on different web platforms
Submitted by grigby1 on Wed, 01/16/2019 - 1:32pm
Web browser
Reactive power
Resiliency
security
security flaw
security of data
Site Intermediate Script attacks
visualization
Web application
Rails
Web Browser Security
Web platforms
web security
Web sites
web vulnerabilities
XSS attacks
XSS injection
XSS security
intrusion prevention
Compositionality
C\# languages
dynamic web pages
HTML pages
Human behavior
information security
internet
Intrusion Detection
command injection attacks
Java
malicious code worker
malicious Java Script code
Metrics
Nanoelectromechanical systems
online front-ends
programming languages
pubcrawl
biblio
A Machine Learning Approach to Malicious JavaScript Detection using Fixed Length Vector Representation
Submitted by grigby1 on Mon, 12/10/2018 - 10:38am
pubcrawl
malicious JavaScript detection
malicious JS code detection
malicious JS codes
Metrics
neural nets
neural network model
Neural networks
pattern classification
plugin software
Predictive models
machine learning
resilience
Resiliency
Support vector machines
Vectors
web applications
Web site
Web sites
Zero day attacks
Zero-day attacks
drive-by-download attacks
Browsers
classifier model
composability
Context modeling
cyberattacks
Cybersecurity
D3M Dataset
defense
Doc2Vec
Doc2Vec features
authoring languages
Drive-by-Download Data
feature extraction
feature learning
features extraction
fixed length vector representation
invasive software
Java
JavaScript
learning (artificial intelligence)
biblio
A First Look at Browser-Based Cryptojacking
Submitted by grigby1 on Mon, 11/19/2018 - 11:15am
Monero
Google
Human behavior
internet
Java
JavaScript code
marketing data processing
Metrics
mining
financial data processing
online front-ends
pubcrawl
resilience
Resiliency
source code (software)
Web sites
website
cryptocurrency
bitcoin
blockchain
botnet
browser mining
browser-based mining
Browsers
Central Processing Unit
Coinhive
advertisement revenue
cryptocurrency Monero
Cryptography
cryptojacking
Data mining
data privacy
electronic money
ethics
biblio
D-XMAN: A Platform For Total Compositionality in Service-Oriented Architectures
Submitted by grigby1 on Thu, 08/23/2018 - 10:49am
MusicCorp
total compositionality
SOA development
service-oriented architectures
service-oriented architecture
service composition
Scalability
pubcrawl
platform
partial compositionality
orchestration
choreography
microservices
Java
exogenous connectors
Electronic mail
DX-MAN
Connectors
Computing Theory
Compositionality
composability
Complexity theory
biblio
Detecting Spring Configurations Errors
Submitted by grigby1 on Thu, 06/07/2018 - 2:11pm
pubcrawl
Human behavior
composability
Java
resilience
Resiliency
static code analysis
attribute grammars
dependency injection
pluggable annotation processing
spring
biblio
Dynamic Software Updating in Java: Comparing Concepts and Resource Demands
Submitted by grigby1 on Thu, 06/07/2018 - 2:01pm
benchmark
composability
dynamic software updating
Java
Metrics
object oriented security
Performance
pubcrawl
resilience
Resiliency
biblio
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach
Submitted by grigby1 on Thu, 05/24/2018 - 11:22am
formal verification
secure messaging
pubcrawl
ProVerif
protocol verification
ProScript protocol code
privacy
policy-based collaboration
Policy
JavaScript programs
Java
Analytical models
end-to end secure messaging protocols
Domain-Specific Language
CryptoVerif proof
Cryptography
Cryptographic Protocols
cryptographic protocol code
Computer bugs
Computational modeling
Compositionality
automated verification
biblio
Database Encryption Using Asymmetric Keys: A Case Study
Submitted by grigby1 on Mon, 04/02/2018 - 11:48am
encryption
web applications
test database
RSA
Resiliency
resilience
pubcrawl
padding
Metrics
Java API
Java
internet
Human behavior
encryption-decryption keys
encryption keys
encryption algorithms
application performance decrease
Encrypted database
ElGamal
ECIES
Distributed databases
Databases
database encryption
Data Security
Cryptography
cryptographic algorithms
Compositionality
Benchmark testing
asymmetric keys
Asymmetric Encryption
application program interfaces
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »