Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software maintenance
biblio
Quality Analysis of iOS Applications with Focus on Maintainability and Security
Submitted by grigby1 on Fri, 03/03/2023 - 12:15pm
visualization
third party libraries
software maintenance
code smells
codes
iOS Security
dependencies
maintainability
ios
source coding
pubcrawl
Compositionality
maintenance engineering
Prototypes
Ecosystems
security
Resiliency
resilience
Metrics
Human Factors
biblio
On the Security of Python Virtual Machines: An Empirical Study
Submitted by grigby1 on Fri, 01/13/2023 - 1:29pm
security
pubcrawl
resilience
Resiliency
Scalability
Data models
Prototypes
Virtual machining
source coding
Writing
data science
Security Heuristics
empirical
Python virtual machines
software maintenance
biblio
Graph Neural Network-based Vulnerability Predication
Submitted by aekwall on Tue, 05/18/2021 - 3:20pm
Conferences
Resiliency
Human behavior
pubcrawl
Metrics
vulnerability detection
Benchmark testing
encoding
Compositionality
Learning systems
AST
CFG
CPG
GNN
software maintenance
vulnerability predication
biblio
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries
Submitted by aekwall on Thu, 04/08/2021 - 4:34pm
rewriting systems
system-level security facilities
rewriting-based randomization
quantitative assessment
legacy software systems
legacy software
legacy binaries
fine-grained randomization tools
code-reuse attacks
Binary Rewriting
advanced security attacks
Information Reuse and Security
security of data
source code
Binary codes
code-reuse attack
fine-grained code randomization
code randomization
Compositionality
software maintenance
risk assessment
pubcrawl
Resiliency
biblio
Evolutionary Computation for Improving Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:13pm
program debugging
variable-strength covering arrays
software improvement
malicious code
individual software artifacts
GI-based bug repair
GI-based approach
genetic improvement
automated repair
automated malware analysis
benign software
Genetics
evolutionary computation
malicious software
Predictive Metrics
Servers
malware samples
Malware Analysis
genetic algorithms
software maintenance
privacy
tools
Metrics
pubcrawl
Human behavior
Resiliency
invasive software
security
malware
biblio
Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process
Submitted by aekwall on Mon, 10/12/2020 - 11:37am
pubcrawl
Technical Debt in the context of Security
technical debt
systems engineering
standards
software reliability
software maintenance
Software
security related technical debt
security related issues
security of data
security
Scalability
Resiliency
False Data Detection
Production systems
production engineering computing
product quality
maintainability
Human behavior
gold standard
Expert Systems and Security
cyber-physical systems
cyber-physical production systems engineering
cyber physical production systems
Computer bugs
best practices
biblio
Automated Repair of Cross-Site Scripting Vulnerabilities through Unit Testing
Submitted by aekwall on Mon, 09/28/2020 - 12:33pm
software debugging
commit frauds
common programming error
Cross Site Scripting attacks
cross site scripting(XSS)
cross-site scripting vulnerabilities
detecting vulnerable web pages
dynamic program analysis
injection attacks
open source medical record application
application vulnerable
suggested encoder
Unit testing
untrusted data
untrusted dynamic content
vulnerability repair
vulnerable codes
XSS vulnerability
Cross Site Scripting
program analysis
Scalability
Resiliency
Human behavior
pubcrawl
internet
web applications
Web sites
program testing
security of data
software maintenance
program diagnostics
software reliability
online front-ends
Web pages
sensitive information
fraud
static program analysis
biblio
SWAN\_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods
Submitted by aekwall on Mon, 09/28/2020 - 11:33am
novel automated machine-learning approach SWAN
software metrics
graphical user interfaces
machine-learning
active machine learning
authentication methods
bug detection
code-specific methods
IntelliJ plugin
program debugging
program analysis
security-relevant methods
semiautomated detection
SRM
static analysis tools
SWAN\_ASSIST aids developers
SWAN\_ASSIST tool
time exactly those methods whose classification best impact
machine learning
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
vulnerability detection
Training
Libraries
security
authentication
public domain software
software maintenance
Automated Secure Software Engineering
Java
program diagnostics
software quality
biblio
FireBugs: Finding and Repairing Bugs with Security Patterns
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
program debugging
Software systems
software quality
software maintenance
software design experience
software defects
security patterns
security of data
security bugs
security
Secure Software Development
Resiliency
resilience
repairing bugs
pubcrawl
Automated Secure Software Engineering
mobile computing
javax.crypto APIs
firebugs
Cryptography
Compositionality
Bug Repair
automated approach
application programming interface
application program interfaces
APIs
Android app repositories
Android (operating system)
composability
biblio
Same App, Different Countries: A Preliminary User Reviews Study on Most Downloaded iOS Apps
Submitted by grigby1 on Thu, 07/30/2020 - 2:33pm
iOS Security
User Reviews Analysis
US App Store
Text Mining
software maintenance
software evolution
requirement engineering
preliminary user reviews study on most downloaded iOS apps
mobile app reviews
mining
differentiate reviews
App Store Analytics
analyzing user reviews
643 user reviews
300 user reviews
15 most downloaded iOS apps
security
Google
Software algorithms
operating systems (computers)
Compositionality
Metrics
mobile computing
software quality
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Forestry
Data mining
1
2
3
4
next ›
last »