Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Source code analysis
biblio
Source Code Analysis for Mobile Applications for Privacy Leaks
Submitted by grigby1 on Mon, 03/14/2022 - 12:20pm
Policy Based Governance
Source code analysis
privacy leaks
Personal digital assistants
codes
smart devices
classification
operating systems
Mobile Applications
Metrics
security
Safe Coding
dynamic analysis
privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
machine learning
biblio
Three-Factor Authentication Scheme Based on Searchable Encryption and Biometric Fingerprint
Submitted by aekwall on Tue, 03/09/2021 - 11:56am
mistrust server
token ID
three-factor authentication scheme
three factor authentication
Source code analysis
Software
Servers
searchable encryption scheme
searchable encryption
Scalability
RSA
Resiliency
pubcrawl
password
pass-code
multi-factor
biometric encryption
Metrics
fingerprint identification
fingerprint
encryption
encrypted content
decryption
Cryptography
cloud server
Cloud Computing
biometrics
biometric fingerprint
authorisation
authentication
3FA
biblio
The European H2020 project VESSEDIA (Verification Engineering of Safety and SEcurity critical Dynamic Industrial Applications)
Submitted by grigby1 on Fri, 06/26/2020 - 1:18pm
IoT security
verification engineering of safety and security critical dynamic industrial applications
tools
static analysis
Source code analysis
software fault tolerance
Software
security of data
Security and Safety Analysis
security
Safety
Resiliency
pubcrawl
program diagnostics
Metrics
certification
IoT
Internet of Things
high-criticality applications
formal verification
Formal Specification
formal methods
European H2020 project VESSEDIA
Europe
embedded systems
Cyber-security
cyber-physical systems
cyber-attacks
connected systems security
composability
biblio
Applying Convolutional Neural Network for Malware Detection
Submitted by grigby1 on Mon, 04/06/2020 - 2:24pm
malware detection
Training
testing
Source code analysis
source code
Resiliency
resilience
pubcrawl
Predictive models
Personnel
network coding
network administrators
Metrics
malware renders conventional detection techniques
malware detection efficiency
binary code analysis
malware
machine learning
learning (artificial intelligence)
knowledge based systems
invasive software
internet
feature extraction
deep learning
cyber physical systems
Convolutional Neural Networks (CNN)
convolutional neural networks
convolutional neural nets
computer network security
composability
biblio
Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance
Submitted by grigby1 on Fri, 02/02/2018 - 1:28pm
pubcrawl
composability
Scalability
software assurance
Mixed Concrete and Symbolic Execution
software security
Source code analysis
static analysis
Trigger-based Behavior
biblio
Recovering Semantic Traceability Links between APIs and Security Vulnerabilities: An Ontological Modeling Approach
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
software houses
safety-critical software
security
security knowledge
security vulnerability
semantic traceability link recovery
Semantic Web
Semantics
Software
software engineering community
Resiliency
software industry globalization
software knowledge
software products
Source code analysis
traceability improvement
trust improvement
Unified modeling language
vulnerabilities and patches
ontological modeling approach
APIs
code reuse
code sharing
Computational modeling
Databases
global software ecosystem
Information Reuse
information silos
Knowledge modeling
API
Ontologies
ontologies (artificial intelligence)
ontology-based knowledge modeling approach
project boundaries
proprietary knowledge representation
pubcrawl
reasoning
reasoning services
biblio
Static analysis for web service security - Tools amp; techniques for a secure development life cycle
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
Web Application Security
SOA
SOAP
software bugs
Software verification
Source code analysis
Static Analysis Tool
static code analysis
strategic components
ubiquitous IoT
vulnerabilities detection
vulnerability identification
Simple object access protocol
web applications
Web service security
web services
Web services guidelines
Web Services Security
WS-SecureConversation
WS-security
XML
XML encryption
XML signature
program verification
critical national infrastructure
Cryptography
dynamic analysis
enterprise software ecosystem
Heartbleed
information exchange
mission critical API
Mobile Applications
Open Web Application Security Project
Penetration Testing
program diagnostics
Computer crime
public deployments
public sector infrastrucure development life cycle
Secure Software Development
security challenges
Security Code Review
service development paradigm
service oriented architecture
service-oriented architecture
services security
Shellshock
biblio
Software Trustworthiness 2.0-A Semantic Web Enabled Global Source Code Analysis Approach
Submitted by BrandonB on Fri, 05/01/2015 - 8:43am
Global source code analysis
Linked Data
Semantic Web
Source code analysis