Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Java
biblio
HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
mobile computing
Static and Dynamic Analysis of Apps
static analysis
source code
security threats
security of data
security
Resiliency
resilience
Repackaging
Registers
reflection
pubcrawl
program diagnostics
obfuscated Android applications
Mobile Security
Android (operating system)
malware
Java
HyDroid
hybrid approach
Humanoid robots
dynamic analysis
Compositionality
application services
application program interfaces
APIs
API call trace generation
Androids
Android applications
Android API call traces
Android API
biblio
Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities
Submitted by grigby1 on Mon, 03/05/2018 - 12:08pm
pubcrawl
testing
static analysis
Software patterns
Software
security vulnerabilities
security
Resiliency
resilience
arrays
nano-patterns
Metrics
Measurement
Java
Cryptography
Compositionality
Complexity theory
coding theory
biblio
SCLCT: Secured cross language cipher technique
Submitted by grigby1 on Wed, 02/21/2018 - 12:44pm
Rails
Metrics
modern era possesses cryptography
open source language
Policy
Policy-Governed Secure Collaboration
privacy
pubcrawl
Rail Fence Cipher
Java
resilience
Resiliency
Scalability
SCLCT Cipher
secret codes
secured cross language cipher technique
security
cryptology
Caesar Cipher
cipher text
Ciphers
CLCT Cipher
collaboration
composability
computing device
Cryptography
automation
data privacy
empowering citizens
encryption
evolving digitization
fascinating science
Human behavior
human factor
biblio
Detecting DOM-Sourced Cross-Site Scripting in Browser Extensions
Submitted by grigby1 on Thu, 02/15/2018 - 10:44am
shadow DOM
JavaScript engines
metadata
online front-ends
program diagnostics
program testing
pubcrawl
resilience
Resiliency
Scalability
security of data
JavaScript
static analysis
text analysis
text filter
trees (mathematics)
Uniform resource locators
web applications
Web pages
web security
XSS vulnerabilities
DOM-sourced XSS
application program interfaces
browser extension vulnerability
browser extensions
Browsers
client-side vulnerabilities
computational linguistics
Cross Site Scripting
Cross Site Scripting (XSS)
Document Object Model
DOM-sourced cross-site scripting detection
abstract syntax tree parser
dynamic symbolic execution
HTML documents
HTML5 API
Human behavior
human factor
Human Factors
hypermedia markup languages
internet
Java
biblio
An IDE for the Design, Verification and Implementation of Security Protocols
Submitted by grigby1 on Wed, 01/10/2018 - 11:19am
intuitive language AnB
verification
tools
software engineering
security protocols
security of data
secure distributed applications
Resiliency
pubcrawl
Protocols
protocol verification
program verification
program compilers
model checker OFMC
Java
AnBx compiler
integrated development environment
implementation
Generators
formal verification
Formal Specification
formal modelling
formal method tools
encryption
Eclipse-based IDE
design
dependable distributed applications
composability
compiler security
code generator
biblio
Evaluating micro patterns and software metrics in vulnerability prediction
Submitted by grigby1 on Thu, 12/28/2017 - 12:30pm
source code
pubcrawl
security
security of data
security vulnerabilities
Software
software metrics
software quality
software security
program testing
source code (software)
stand-alone Java web applications
time effective software testing
traditional class-level software metrics
traditional software metrics
vulnerability prediction model
vulnerable classes
vulnerable code
Java
Apache Tomcat
class-level patterns
class-level traceable patterns
Complexity theory
cost effective software testing
Design patterns
early detection
internet
Apache Camel
learning (artificial intelligence)
machine learning techniques
Metrics
micropatterns evaluation
Object oriented modeling
Predictive Metrics
Predictive models
predictive security metrics
biblio
Efficient distribution of fragmented sensor data for obfuscation
Submitted by grigby1 on Wed, 12/20/2017 - 12:01pm
Java
sensor security
sensors
Routing
Prototypes
emulation
Distributed databases
Data fragmentation
computer security
Metrics
Cryptography
composability
obfuscation
Human Factors
Human behavior
Resiliency
pubcrawl
biblio
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing
Submitted by K_Hooper on Wed, 12/20/2017 - 10:33am
testing
program testing
programming error
pubcrawl
public domain software
Resiliency
security
security of data
security unit testing approach
program diagnostics
unit test execution framework
Unit testing
untrusted data sanitization
Web Browser Security
Web page context
Web pages
XSS attacks
XSS vulnerability
grammar-based attack generator
Attack generation
automated unit testing
automatic programming
Browsers
cross-site scripting vulnerabilities detection
Data Sanitization
encoder
encoding
Cross Site Scripting
grammars
HTML
Human behavior
injection attacks
Java
Metrics
open source medical records application
program analysis
biblio
A Feasibility Study of Autonomically Detecting In-Process Cyber-Attacks
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
Scalability
normal application behavior
off-line models
on-line models
perturbed applications
program transformation
pubcrawl
QoS requirements
quality-of-service requirements
Resiliency
Runtime
Monitoring
security
security of data
Software
software development process
software vulnerabilities
supervised training
Trusted Computing
trusted software application
unsafe actions
web applications
features extraction
application-agnostic cyber-attack detection system
Attack vectors
attacker
autonomic alert system
autonomic cyber-attack detection system
Autonomic Security
call graph
control flow
exemplar Web-based applications
feature extraction
application execution
heterogeneous software systems
in-process cyber-attacks
Instruments
Java
learning (artificial intelligence)
learning strategies
lightweight structures
machine learning techniques
Metrics
biblio
Early Identification of Vulnerable Software Components via Ensemble Learning
Submitted by grigby1 on Mon, 11/27/2017 - 11:30am
Resiliency
vulnerability detection scheme
vulnerability detection
Vulnerability
Training data
Training
supports vector machine algorithm
Support vector machines
support vector machine
software testing process
Software systems
software reliability
smart phones
security of data
robust software system
Compositionality
pubcrawl
program testing
Predictive models
Prediction algorithms
object-oriented programming
mislabeled data
Metrics
learning (artificial intelligence)
Java Android applications
Java
Human Factors
Human behavior
Ensemble Learning
early vulnerable software component identification
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »