Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public domain software
biblio
A Security Audit of the OpenPGP Format
Submitted by K_Hooper on Wed, 05/09/2018 - 10:56am
public domain software
OpenPGP
OpenPGP format
OpenPGP format specification
OpenPGP implementations
pattern classification
PGP
Production
Protocols
pubcrawl
open source Unix systems
Public key
Resiliency
Scalability
security audit
Security Audits
security vulnerabilities
Symantec PGP
Unix
email confidentiality
authorisation
computer security
context-free grammars
context-free languages
deterministic context free grammar
deterministic context free language
Electronic mail
email authenticity
authenticated package distributions
Formal Specification
GNU Privacy Guard
GnuPG
Grammar
Human behavior
language theoretical analysis
Language-theoretic security
malicious input data
biblio
A Support Vector Machine Based Approach for Code Smell Detection
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
resilience
Training
SVMCSD
Support vector machines
support vector machine
Software systems
software quality
software metrics
software maintenance
software developers
Resiliency
Anti-patterns
public domain software
pubcrawl
Metrics
Measurement
learning (artificial intelligence)
DETEX
computer science
composability
code smells
code smell detection
biblio
An Experimental Study of Four Methods for Homology Analysis of Firmware Vulnerability
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
Libraries
vulnerability detection
vulnerabilities
tools
third-party libraries
string matching
string feature matching
security
Resiliency
public domain software
pubcrawl
power grid vulnerability analysis
normalized compression distance
Microprogramming
Metrics
Binary difference analysis
Internet of Things
Human behavior
homology analysis
fuzzy set theory
fuzz hash
firmware vulnerability
firmware
File systems
file organisation
feature extraction
embedded device
development kits
Compositionality
code reuse
biblio
Multiple fault diagnosis in analog circuits using the indirect compensation theorem
Submitted by grigby1 on Thu, 02/15/2018 - 11:46am
public domain software
linear subcircuits
Metrics
multiple fault diagnosis
multiple faults diagnosis techniques
multiport networks
nullor
parameter estimation
Ports (Computers)
pubcrawl
linear network analysis
resilience
Resiliency
symbolic analysis
symbolic analysis process
symbolic circuit analysis
Topology
two-port network
Voltage measurement
equivalent circuits
Analog circuits
analogue circuits
circuit analysis computing
circuit determinant expressions
Circuit faults
circuit simulation
Cirsym freeware computer program
Current measurement
analog circuit diagnosis
fault diagnosis
generalized parameter extraction method
Human behavior
human factor
Human Factors
indirect compensation theorem
linear analog circuits
linear models
biblio
Data Protection in OpenStack
Submitted by grigby1 on Tue, 01/16/2018 - 6:33pm
operational cloud deployment
virtual machines
virtual machine images
storage encryption
security of data
security features
Security analysis
Scalability
Resiliency
public domain software
pubcrawl
Pervasive Computing Security
Organizations
basic security controls
OpenStack range
Open Source Software
open source cloud computing platform
Neutrons
Metrics
Human Factors
Hardware
encryption
Data Security
Data protection
cloud providers
Cloud Computing
biblio
Large-Scale Analysis Detection of Authentication Cross-Site Request Forgeries
Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
Metrics
Web sites
Web site authentication
Web Browser Security
web applications
testing
security testing strategies
security of data
Resiliency
public domain software
pubcrawl
open-source penetration testing tool OWASP ZAP
Microsoft
Auth-CSRF
large-scale analysis
identity management functionalities
Human behavior
History
Google
experimental analysis
eBay
CSRF-checker
Browsers
authentication CSRF
authentication cross-site request forgery detection
authentication
biblio
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing
Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
testing
program testing
programming error
pubcrawl
public domain software
Resiliency
security
security of data
security unit testing approach
program diagnostics
unit test execution framework
Unit testing
untrusted data sanitization
Web Browser Security
Web page context
Web pages
XSS attacks
XSS vulnerability
grammar-based attack generator
Attack generation
automated unit testing
automatic programming
Browsers
cross-site scripting vulnerabilities detection
Data Sanitization
encoder
encoding
Cross Site Scripting
grammars
HTML
Human behavior
injection attacks
Java
Metrics
open source medical records application
program analysis
biblio
Detection of botnet by analyzing network traffic flow characteristics using open source tools
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
pattern classification
fraud
invasive software
IP networks
malware
Mobile Botnet
Mobile communication
network traffic flow characteristics analysis
open source tools
financial threat
payload analysis
payload inspection
Payloads
phishing attack
pubcrawl170109
public domain software
Servers
telecommunication traffic
C&C channels
Bot
bot host classification
Bot master
bot masters
botnet
botnet activity detection
Botnet cloud
botnet detection technique
Bluetooth
click fraud
Computer crime
computer network security
Conferences
cyber threat
cybercriminal activities
DDoS
encrypted C&C channel
biblio
"Execution Time Measurement of Virtual Machine Volatile Artifacts Analyzers"
Submitted by abfox on Tue, 02/14/2017 - 1:33pm
public domain software
virtualization environment
virtualisation
Virtual machining
virtual machines
virtual machine volatile artifact analyzers
Virtual machine monitors
virtual machine introspection
virtual infrastructure privileged access
storage management
spyware
Semantics
semantic gap
rootkit
Random access memory
advanced persistent threat
pubcrawl170101
memory forensic analysis tool
memory forensic analysis
malware
live virtual machine RAM dump
LibVMI open source tool
Kernel
invasive software
intrusion detection system
hypervisor
execution time measurement
Digital Forensics
captured memory dump analysis
advanced persistent threats
biblio
Towards more accurate multi-label software behavior learning
Submitted by BrandonB on Wed, 05/06/2015 - 2:34pm
modern software system
Training
software vendor
software maintenance
software fault tolerance
Software Behavior Learning
Software algorithms
Software
public domain software
Prediction algorithms
open source programs
multilabel software behavior learning
Multi-label Learning
Baidu
MLL-GA
Ml.KNN
learning (artificial intelligence)
genetic algorithms
genetic algorithm
fault labels
F-measures
execution trace
crash report
Computer crashes
Biological cells
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »