Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public domain software
biblio
An Auditing Framework for Vulnerability Analysis of IoT System
Submitted by aekwall on Mon, 03/09/2020 - 11:06am
IoT device
Security Audits
security frameworks
resource constraint nature
open-source tools
open-source framework
communication vulnerabilities
auditing framework
auditing
virtual world
framework
IoT system
physical world
IoT
Scalability
Internet-of-Things
firmware
public domain software
Vulnerability Analysis
pubcrawl
Human behavior
Resiliency
security
Internet of Things
security of data
biblio
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
Open Source Software
vulnerable code public
unpatched OSS versions
software vendors
security patches mapping
security patch database
security fixes
secretly patched vulnerabilities
secret security patches
n-day attacks
easy software development management
BoringSSL
armored attackers
0-day vulnerability
0-day attacks
security patch
security of data
Compositionality
software maintenance
software development management
public domain software
Computer bugs
machine learning
Training
Databases
vulnerability detection
Metrics
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
security
biblio
Learning to Identify Security-Related Issues Using Convolutional Neural Networks
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
open source issues
Semantics
user interfaces
agile development practices
aid development teams
CNN
high dimensional word embeddings
issue descriptions
Man-machine systems
natural language descriptions
security issues
robust security assurance
SDL
security-focused automation
security-related content
security-related requirements
software products
two-phase neural net architecture
vulnerability descriptions
software assurance
convolutional neural network
security
Kernel
computer architecture
learning (artificial intelligence)
pubcrawl
composability
deep learning
Databases
convolutional neural nets
security of data
Companies
ontologies (artificial intelligence)
Data mining
public domain software
software security
Scalability
software quality
Human Factors
biblio
Identification of the Impacts of Code Changes on the Security of Software
Submitted by aekwall on Mon, 02/10/2020 - 12:09pm
electronic commerce
software assurance
software lifetime
software code
security state
security assurance cases
security assurance case
security assessment time
open-source ERP software application
open-source e-commerce software application
Open Source Software
monitored security functions
incremental development
enterprise resource planning
code change impact
assurance case elements
Monitoring
security requirements
Scalability
safety-critical software
Java
code review
source code (software)
software maintenance
Unified modeling language
public domain software
tools
software security
composability
pubcrawl
security
biblio
Security Analysis for SmartThings IoT Applications
Submitted by aekwall on Mon, 01/27/2020 - 10:27am
program diagnostics
taint analysis
tainted flows
Taint-Things
Taint Static Analysis
SmartThings IoT applications
security auditors
IoT SmartHome Apps
fully automated static analysis approach
security of data
software security
Security analysis
public domain software
data flow analysis
Metrics
composability
pubcrawl
Internet of Things
biblio
OWL: Understanding and Detecting Concurrency Attacks
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
Computer bugs
Predictive Metrics
Concurrency
Software Testing
single-threaded programs
OWL source code
OWL
knowledge representation languages
concurrency bug detectors
concurrency attack exploit scripts
Concurrency Attack
bug-inducing inputs
Concurrent computing
concurrency control
security
cyber-physical system
cyber-physical systems
Instruction sets
program debugging
public domain software
Linux
composability
Resiliency
Metrics
pubcrawl
resilience
tools
biblio
MeetCI: A Computational Intelligence Software Design Automation Framework
Submitted by grigby1 on Mon, 12/09/2019 - 2:01pm
MeetCI
XML file
XML
tools
specific supported functionality
software implementation process
software engineering
Software design automation
Software algorithms
Software
Security Evaluation
Recurrent neural networks
recurrent neural nets
public domain software
pubcrawl
open source software framework
application design decisions
machine learning domains
machine learning
Libraries
learning (artificial intelligence)
language compatibility
expert systems
expert system
Cryptography
computational intelligence techniques
computational intelligence software design automation framework
computational intelligence libraries
computational intelligence
Compositionality
composability
CI users
biblio
Formally Verified Cryptographic Web Applications in WebAssembly
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
verification
Protocols
pubcrawl
public domain software
Resiliency
Scalability
security-critical software
Servers
Signal
sophisticated custom cryptographic components
standard protocols
standards
toolchain
program verification
verification techniques
verification-oriented programming languages
verified cryptographic Web applications
verified HACL cryptographic library
verified implementation
verified-software
web-security
Webassembly
WebAssembly compilers
WebAssembly version
whatsapp
formal verification
Browsers
CoMP
compilation pipeline
compiler
compiler security
Compositionality
cryptographic code
Cryptographic Protocols
cryptographic-library
cryptographic-protocol-verification
Cryptography
authoring languages
high-assurance cryptographic libraries
high-profile attacks
instruction set
Java
JavaScript runtimes
Libraries
low-level subset
Metrics
modern Web applications
program compilers
program diagnostics
biblio
Mining Software Repositories for Predictive Modelling of Defects in SDN Controller
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
predictive modelling
Stochastic processes
software release management
software metrics
software development management
software defined networking control plane
software defined networking
software defect metrics
Software
security
Reliability
public domain software
pubcrawl
Protocols
program debugging
production grade SDN controller
predictive security metrics
OpenDaylight architecture
open source SDN controller platform
network operating system
mining software repositories
Metrics
Git version control system
Data mining
control systems
Configuration Management
computer network management
Computer bugs
bug repository
bug removal rates
bug manifestation
bug characteristics
biblio
Cross-Release Code Churn Impact on Effort-Aware Software Defect Prediction
Submitted by grigby1 on Thu, 09/26/2019 - 10:25am
open-source projects
standards
software quality
software metrics
software defect prediction
Safe Coding
Resiliency
resilience
regression analysis
public domain software
pubcrawl
Predictive models
Pop effort aware measure
policy-based governance
AUC
Open Source Software
Metrics
Measurement
Human Factors
Human behavior
GM
effort-aware software defect prediction
design metrics
cross-release code churn impact
Cross-release code churn
Correlation
complex systems
collaboration
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »