Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Writing
biblio
A Generalized Notion of Non-interference for Flow Security of Sequential and Concurrent Programs
Submitted by aekwall on Tue, 06/01/2021 - 1:20pm
programming
security
pubcrawl
composability
software engineering
Lattices
Writing
Semantics
Compositionality
Information Flow Control
Concurrent computing
concurrent
Generalization
non-interference
Programming Language
sequential
biblio
AT-ROP: Using static analysis and binary patch technology to defend against ROP attacks based on return instruction
Submitted by aekwall on Mon, 05/03/2021 - 1:04pm
return oriented programming
binary patch
composability
feature extraction
Human Factors
Linux
parameter registers
programming
pubcrawl
Resiliency
rop attacks
Scalability
Software
static analysis
tools
Writing
biblio
Extracting Taint Specifications for JavaScript Libraries
Submitted by grigby1 on Mon, 03/15/2021 - 1:10pm
static analysis tools
pubcrawl
resilience
Resiliency
security
security of data
security vulnerabilities
software engineering
static analysis
program testing
taint sinks
taint specifications
test suites
testing
third-party libraries
tools
Writing
JavaScript applications
access path mechanism
authoring languages
command injection attacks
composability
cross-site scripting
dynamic analysis
Entry points
exit points
taint analysis
JavaScript libraries
Libraries
Metrics
Node.js platform
npm repository
package dependency structure
program diagnostics
biblio
CheckMyCode: Assignment Submission System with Cloud-Based Java Compiler
Submitted by aekwall on Mon, 03/15/2021 - 12:08pm
Java cloud based programming compiler
portability
assignment management system
CheckMyCode system
cloud based Java compiler
cloud compiler
Cloud System
computer science and engineering curriculum
educational courses
computer aided instruction
Java programming
learning system
mobile learning
PC browser
programming assignment submission system
programming language learning
smart device browser
Java
Scalability
programming
Task Analysis
Program processors
Resiliency
pubcrawl
Metrics
computer science education
Cloud Computing
Multimedia systems
Writing
Compositionality
program compilers
programming languages
compiler security
smart devices
biblio
Toward a Natural Language-Based Approach for the Specification of Decisional-Users Requirements
Submitted by aekwall on Mon, 02/22/2021 - 1:40pm
Multidimensional Model
Data Warehouse technology
decision-makers
decision-making processes
decisional-users requirements
DW design
DW model
DW multidimensional schema
great challenge research domain
multidimensional components
Data Warehouse
natural language
natural language NL-template
NL-templates
OLAP
On-Line-Analytical-Processing queries
query-like English sentences
requirement-gathering phase
Star schema
natural language processing
Ontologies
Task Analysis
Resiliency
Human behavior
pubcrawl
query processing
tools
Decision Making
data analysis
Scalability
Writing
Data Analytics
data warehouses
cleaning
critical task
Natural languages
complex task
Constellation schema
biblio
Fair Transfer of Multiple Style Attributes in Text
Submitted by grigby1 on Fri, 12/11/2020 - 2:52pm
one-style transfer
Yelp dataset
written text
Writing
Training
text style transfer
text generation
text analysis
target text
style attributes
single-style transfers
Scalability
Resiliency
resilience
pubcrawl
communication style
neural style transfer
Neural networks
neural network architecture
neural net architecture
natural language processing
multi-style transfer
Metrics
machine learning
Indexes
Focusing
fair transfer
deep learning
Decoding
biblio
Improving MPI Collective I/O for High Volume Non-Contiguous Requests With Intra-Node Aggregation
Submitted by grigby1 on Fri, 10/30/2020 - 12:19pm
MPI collective I/O
Writing
two-phase I/O
security
Scalability
request redistribution
pubcrawl
Program processors
Production
performance evaluation
parallel processing
parallel jobs
Parallel I/O
non-contiguous I/O
MPI processes
Aggregates
message passing
Libraries
intranode aggregation
internode communication contention
Intel KNL
input-output programs
i-o systems security
I-O Systems
high volume noncontiguous requests
Haswell processors
Cray XC40 parallel computers
collective MPI-IO functions
Benchmark testing
biblio
Enabling File-Oriented Fast Secure Deletion on Shingled Magnetic Recording Drives
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
magnetic recording
Writing
storage device
SMR drives
shingled magnetic recording drives
shingled magnetic recording
serious write amplification
security of data
secure deletion operations
Scalability
pubcrawl
privacy
performance degradation
data deletion
Layout
file-oriented fast secure deletion strategy
file-oriented
File systems
file organisation
file information
FFSD
fast secure deletion
encryption
Drives
Degradation
data layout
biblio
Understanding Data Science Lifecycle Provenance via Graph Segmentation and Summarization
Submitted by aekwall on Mon, 03/30/2020 - 11:33am
graph segmentation operator
Approximation algorithms
boundary criteria
context free language
context-free grammar
data science lifecycle provenance
data science platforms
destination vertices
graph data models
graph query
graph query model
approximation theory
graph summarization operator
high-level graph query operators
model management
provenance ingestion mechanisms
provenance management
PSPACE-complete
query techniques
Skeleton
source vertices
optimisation
Resiliency
Human behavior
pubcrawl
composability
graph theory
Metrics
query processing
Databases
context-free grammars
Data models
computational complexity
meta data
metadata
Writing
Pipelines
Semantics
Provenance
data science
data handling
biblio
Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors Using Fuzzy Hashing and Fuzzy C-Means Clustering
Submitted by grigby1 on Wed, 02/26/2020 - 4:41pm
signature based defense
fuzzy techniques
Indexes
Locky
malicious code writing
Measurement
pattern clustering
privacy
pubcrawl
Ransomware
ransomware threat actor
SDHASH
fuzzy similarity scores
Similarity Preserving
SSDEEP
successful attack vectors
threat actors
threat vectors
Triaging
unknown ransomware
unlimited polymorphic samples
WannaCry
WannaCryptor
Writing
Cryptography
Resiliency
Metrics
Fuzzy Cryptography
Attack Surfaces
c-means clustering
Cerber
cluster ransomware samples
clustering methods
clustering techniques
composability
Context-Triggered Piecewise Hashing
Scalability
CryptoWall
CTPH
cyberthreat hunting
efficient fuzzy analysis approach
FCM
FCM clustering results
fuzzy c-means clustering
Fuzzy Hashing
fuzzy hashing methods
fuzzy set theory
« first
‹ previous
1
2
3
4
5
6
next ›
last »