Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Libraries
biblio
SWAN\_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods
Submitted by aekwall on Mon, 09/28/2020 - 11:33am
novel automated machine-learning approach SWAN
software metrics
graphical user interfaces
machine-learning
active machine learning
authentication methods
bug detection
code-specific methods
IntelliJ plugin
program debugging
program analysis
security-relevant methods
semiautomated detection
SRM
static analysis tools
SWAN\_ASSIST aids developers
SWAN\_ASSIST tool
time exactly those methods whose classification best impact
machine learning
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
vulnerability detection
Training
Libraries
security
authentication
public domain software
software maintenance
Automated Secure Software Engineering
Java
program diagnostics
software quality
biblio
Automated Synthesis of Differential Power Attack Resistant Integrated Circuits
Submitted by aekwall on Mon, 08/24/2020 - 12:41pm
Dynamic Differential Logic
cryptographic processors
cryptographic systems
differential circuit design
differential logic
Differential Power Analysis
differential power analysis attacks
differential power attack resistant integrated circuits
DPA attack resistance
DPA resistant cell designs
combinational cells
fully automated synthesis system DPA resistant integrated circuits
MDPL
multiplying circuits
RT level Verilog specifications
secret key information
Secure Differential Multiplexer Logic
sequential cells
sequential circuits
power consumption
Resiliency
pubcrawl
composability
Cryptography
standards
tools
Libraries
Automated Response Actions
Logic gates
private key cryptography
Power demand
logic design
Hardware Security
Resistance
combinational circuits
Automated Synthesis
CMOS logic circuits
CMOS synthesis
biblio
An Empirical Study on API-Misuse Bugs in Open-Source C Programs
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
C language
API misuse
API-misuse bugs
API-misuse detection
API-misuse detectors
APIMU4C
benchmark
bug detection
C code
application programming interfaces
empirical study
fix patterns
Open Source Software
open-source C programs
static analysis detectors
usage statistics
application programming interface
security of data
Detectors
Compositionality
public domain software
security vulnerabilities
Computer bugs
application program interfaces
APIs
program diagnostics
program debugging
static analysis
Libraries
Benchmark testing
Resiliency
resilience
pubcrawl
biblio
A gateway to easily integrate simulation platforms for co-simulation of cyber-physical systems
Submitted by grigby1 on Thu, 07/16/2020 - 11:56am
pubcrawl
Java
Large-scale systems
Libraries
Logic gates
Metrics
National Institute of Standards and Technology co-simulation platform
NIST co-simulation platform
Object oriented modeling
interacting physical components
Research Infrastructure
resilience
Resiliency
simulations
Software Architecture
standards
Universal CPS Environment
CPS modeling
high-level architecture standard
high level architecture
functional mock-up interface
distributed simulation
distributed processing
digital simulation
cyber-physical systems
CPS conceptual design
computer architecture
Computational modeling
composability
communication libraries
co-simulation expertise
co-simulation
simulation
biblio
Towards a TRansparent I/O Solution
Submitted by aekwall on Mon, 06/01/2020 - 10:49am
source code
preceding graph
pubcrawl
Regulated I/O
resilience
Resiliency
reusable components
security
security of data
Semantics
software reusability
policy-based governance
source code (software)
storage back-end
storage platforms
Strips
Transparent I/O
transparent I/O solution
Web service scenario security
web services
workload diversity
in-transit processing
complex storage solutions
composability
cost reduction
custom code
data distribution
data lands
encryption
graph chain
In transit engine
application behaviors
infrastructure level
infrastructure setup
infrastructure-related changes
Libraries
Logic gates
management code
metadata
middleware
middleware security
biblio
Extractive Persian Summarizer for News Websites
Submitted by aekwall on Mon, 05/18/2020 - 10:55am
pre-processing
Web sites
tools
textual information
text analysis
statistical methods
statistical
sentence length
Semantics
semantic methods
Scalability
salient sentences
salient features
Resiliency
pubcrawl
automatic extractive text summarization
Persian news articles
natural language processing
Libraries
Human behavior
heuristical and semantical
heuristic methods
genetic algorithms
feature vector
feature extraction
extractive text summarization
extractive Persian summarizer
English words
Data mining
biblio
Experience Report: How to Extract Security Protocols' Specifications from C Libraries
Submitted by grigby1 on Fri, 04/24/2020 - 4:20pm
object-oriented languages
tools
Task Analysis
Software
security protocols
security protocol specifications
security of data
security
reverse engineering
Resiliency
resilience
pubcrawl
Protocols
object-oriented programming
automatic tools
object oriented security
Metrics
Libraries
human-dependent approach
formal verification
Formal Specification
formal model
extract security protocols
documentation
composability
codelevel reverse engineering
C programming language
C libraries
biblio
Using Safety Properties to Generate Vulnerability Patches
Submitted by aekwall on Mon, 04/20/2020 - 10:45am
relational databases
vulnerability-specific safety properties
source code patches
Software-Vulnerability
Software-Patch
safety-property
safety property
property-based APR
Program-Analysis
Buffer storage
automatic program repair methods
Automated-Program-Repair
relational database security
program debugging
Engines
Safety
program verification
program diagnostics
software maintenance
security vulnerabilities
Libraries
tools
Metrics
composability
pubcrawl
Human behavior
Resiliency
Software
security
security of data
biblio
Side Channel Attacks in Computation Offloading Systems with GPU Virtualization
Submitted by grigby1 on Fri, 04/17/2020 - 10:23am
Runtime
Metrics
mobile computing
mobile systems
operating system
privacy
pubcrawl
resilience
Resiliency
Libraries
side channel attack
side channel attacks
side-channel attacks
virtual machine
virtual machines
virtualisation
Virtualization
virtualization privacy
graphics processing units
Cloud Computing
composability
computation offloading systems
computation performance
Cryptography
GPU systems
GPU vendors
GPU virtualization
cloud
high-performance GPUs
Human behavior
Human Factors
intensive computation
Internet of Things
IoT
Kernel
learning (artificial intelligence)
biblio
A Method of Conflict Detection for Security Policy Based on B+ Tree
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
network security
trees (mathematics)
tree data structures
security policy
security
Redundancy
pubcrawl
Protocols
policy-based governance
policy conflict
Policy Based Governance
B+ tree
network management system
Libraries
Indexes
detection algorithms
conflict detection
computer network security
computer network management
Communication networks
collaboration
B+ tree-based security policy conflict detection method
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »