Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
program testing
biblio
Development of a suite of IPv6 vulnerability scanning tests using the TTCN-3 language
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
test maintainability
program testing
Protocols
Prototypes
pubcrawl
Resiliency
security of data
specification languages
telecommunication computing
telecommunication security
test extensibility
passive analysis
test specification language
testing
Testing and Test Control Notation version 3
transport protocols
TTCN-3
TTCN-3 language
vulnerability assessment
vulnerability detection
Vulnerability Management
vulnerability scanning
Human behavior
application security
attacks simulation
Compositionality
Computer crime
denial of service
denial-of-service attack detection
Device Security
dual-stack networks
Duplicate Address Detection
Formal Specification
Address autoconfiguration
ICMPv6 Protocol
internet
IP networks
IPv4 IPv6 protocol
IPv6
IPv6 networks
IPv6 vulnerability scanning tests
Linux
Metrics
network communications
biblio
Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
SQL injection
privacy
program testing
pubcrawl
Regular Expression Inference
Resiliency
search problems
software maintenance
SQL
Policy-Governed Secure Collaboration
SQL Injection attacks
testing
vulnerabilities detection
vulnerable WAFs
WAF rule set
web application firewalls
Web application firewalls repair
web security
Human behavior
collaboration
combinatorial mathematics
combinatorial optimisation problem
Decision trees
filter rules
firewalls
Firewalls (computing)
genetic algorithms
Automated Testing
internet
learning (artificial intelligence)
legitimate requests
machine learning
multiobjective genetic algorithms
Policy
policy-based governance
biblio
Testing Techniques and Analysis of SQL Injection Attacks
Submitted by grigby1 on Thu, 05/24/2018 - 12:08pm
SQL Injection vulnerability
resilience
Resiliency
security of data
security systems
security testing
sensitive data
sensitive information
SQL
SQL injection
SQL Injection attacks
SQL injection problems
relational databases
SQL query
testing techniques
three-tier-architecture
traditional security policies
user interfaces
users
Web application vulnerabilities
web applications
Web sites
website
handy interface
attackers
Cogeneration
commonly used Web application attacks
composability
Data protection
database-driven Web applications
DH-HEMTs
different security systems
effective data protection systems
good target
governmental organizations
attack
Human behavior
integrated circuits
internet
Knowledge engineering
Metrics
penetration testing technique
program testing
proper data protection
pubcrawl
relational database security
biblio
S2F: Discover Hard-to-Reach Vulnerabilities by Semi-Symbolic Fuzz Testing
Submitted by K_Hooper on Wed, 04/04/2018 - 9:58am
program testing
vulnerability detection tools
vulnerability detection
tools
test case generation
Symbolic Execution
Software Vulnerability
software tools
semisymbolic fuzz testing
Resiliency
pubcrawl
Prototypes
Binary Analysis
path explosion
Metrics
low frequency input
Human behavior
hard-to-reach vulnerabilities
fuzzy set theory
Fuzz Testing
fuzzing
Explosions
Computer bugs
Compositionality
biblio
Detecting DOM-Sourced Cross-Site Scripting in Browser Extensions
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
shadow DOM
JavaScript engines
metadata
online front-ends
program diagnostics
program testing
pubcrawl
resilience
Resiliency
Scalability
security of data
JavaScript
static analysis
text analysis
text filter
trees (mathematics)
Uniform resource locators
web applications
Web pages
web security
XSS vulnerabilities
DOM-sourced XSS
application program interfaces
browser extension vulnerability
browser extensions
Browsers
client-side vulnerabilities
computational linguistics
Cross Site Scripting
Cross Site Scripting (XSS)
Document Object Model
DOM-sourced cross-site scripting detection
abstract syntax tree parser
dynamic symbolic execution
HTML documents
HTML5 API
Human behavior
human factor
Human Factors
hypermedia markup languages
internet
Java
biblio
Analysis of software security testing using metaheuristic search technique
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
program testing
testing
tabu search
software security testing analysis
software assurance
Software
simulated annealing
security of data
security
search problems
Search Based Testing
Search Based Engineering
Scalability
pubcrawl
composability
particle swarm optimization techniques
particle swarm optimisation
metaheuristic search technique
metaheuristic
hill climbing
heuristic search technique
heuristic
genomics
genetic algorithms
genetic algorithm
fitness function
cost effective
Conferences
biblio
Theoretical Feasibility of Statistical Assurance of Programmable Systems Based on Simulation Tests
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
simulated hardware platform
ultra-high reliability levels
theoretical feasibility
testing
test time expansion problem
Test Time Expansion
statistical testing
statistical test
statistical assurance
statistical analysis
software-intensive system
software reliability
software assurance
Software
simulation tests
composability
Scalability
reliability theory
Reliability
pubcrawl
protection system
programmable systems
program testing
platform simulation approach
Hardware
Failure Probability
estimation
Emulation/Simulation-enhanced Test
empirical failure probability estimation
continuous operation systems
biblio
Evaluating micro patterns and software metrics in vulnerability prediction
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
source code
pubcrawl
security
security of data
security vulnerabilities
Software
software metrics
software quality
software security
program testing
source code (software)
stand-alone Java web applications
time effective software testing
traditional class-level software metrics
traditional software metrics
vulnerability prediction model
vulnerable classes
vulnerable code
Java
Apache Tomcat
class-level patterns
class-level traceable patterns
Complexity theory
cost effective software testing
Design patterns
early detection
internet
Apache Camel
learning (artificial intelligence)
machine learning techniques
Metrics
micropatterns evaluation
Object oriented modeling
Predictive Metrics
Predictive models
predictive security metrics
biblio
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing
Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
testing
program testing
programming error
pubcrawl
public domain software
Resiliency
security
security of data
security unit testing approach
program diagnostics
unit test execution framework
Unit testing
untrusted data sanitization
Web Browser Security
Web page context
Web pages
XSS attacks
XSS vulnerability
grammar-based attack generator
Attack generation
automated unit testing
automatic programming
Browsers
cross-site scripting vulnerabilities detection
Data Sanitization
encoder
encoding
Cross Site Scripting
grammars
HTML
Human behavior
injection attacks
Java
Metrics
open source medical records application
program analysis
biblio
Early Identification of Vulnerable Software Components via Ensemble Learning
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Resiliency
vulnerability detection scheme
vulnerability detection
Vulnerability
Training data
Training
supports vector machine algorithm
Support vector machines
support vector machine
software testing process
Software systems
software reliability
smart phones
security of data
robust software system
Compositionality
pubcrawl
program testing
Predictive models
Prediction algorithms
object-oriented programming
mislabeled data
Metrics
learning (artificial intelligence)
Java Android applications
Java
Human Factors
Human behavior
Ensemble Learning
early vulnerable software component identification
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »