Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software maintenance
biblio
Using Safety Properties to Generate Vulnerability Patches
Submitted by aekwall on Mon, 04/20/2020 - 10:45am
relational databases
vulnerability-specific safety properties
source code patches
Software-Vulnerability
Software-Patch
safety-property
safety property
property-based APR
Program-Analysis
Buffer storage
automatic program repair methods
Automated-Program-Repair
relational database security
program debugging
Engines
Safety
program verification
program diagnostics
software maintenance
security vulnerabilities
Libraries
tools
Metrics
composability
pubcrawl
Human behavior
Resiliency
Software
security
security of data
biblio
A Clone Code Detection Method Based on Software Complex Network
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
network coding
software-security
software-network
software network model
software maintenance
software complex network feature matching
software clone detection
security of data
Security analysis
resilience
pubcrawl
program diagnostics
open source code
Information Reuse and Security
Metrics
feature-matching
cyber physical systems
composability
complex networks
code comparison
clone-code-detection
clone codes information
clone code detection method
added features
Resiliency
Compositionality
biblio
ICS/SCADA Device Recognition: A Hybrid Communication-Patterns and Passive-Fingerprinting Approach
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
documentation
computerised monitoring
industrial control
industrial control system
SCADA Systems Security
Compositionality
TCPIP
defense augmentation
Device recognition
Object recognition
hybrid communication-patterns
ICS/SCADA device recognition
Industrial Control Systems
legacy ICS/SCADA systems
network data fingerprinting
passive-fingerprinting
SCADA fingerprinting
security of data
software maintenance
security vulnerabilities
Python
production engineering computing
Databases
pubcrawl
Human behavior
Resiliency
cyber-physical systems
supervisory control and data acquisition systems
SCADA systems
mobile computing
Protocols
security
Internet of Things
biblio
Host Oriented Factor Normalizing Authentication Resource: More Secure Authentication for Legacy Systems
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
password
software program
scalable multifactor authentication method
legacy systems authentication
legacy systems
host oriented factor normalizing authentication resource
computer systems security
authentication model
two factor authentication
secure authentication
Multi-factor authentication
authorisation
radiofrequency identification
biometrics
authorization
security issues
Human Factors
biometrics (access control)
software maintenance
radio frequency identification
pubcrawl
biblio
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
Open Source Software
vulnerable code public
unpatched OSS versions
software vendors
security patches mapping
security patch database
security fixes
secretly patched vulnerabilities
secret security patches
n-day attacks
easy software development management
BoringSSL
armored attackers
0-day vulnerability
0-day attacks
security patch
security of data
Compositionality
software maintenance
software development management
public domain software
Computer bugs
machine learning
Training
Databases
vulnerability detection
Metrics
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
security
biblio
Leveraging SecDevOps to Tackle the Technical Debt Associated with Cybersecurity Attack Tactics
Submitted by aekwall on Mon, 02/10/2020 - 12:11pm
software quality
software assurance
technical debt principal
technical consequences
static analysis techniques
source code maintenance
SecDevOps
malicious external attacks
malicious attack tactics
external cybersecurity attacks
external attack tactics
exploitable source code vulnerabilities
cybersecurity attack tactics
Common Weakness Enumerations
system weaknesses
technical debt
security of data
quality assurance
Scalability
program diagnostics
source code (software)
software maintenance
static analysis
computer security
Cybersecurity
tools
composability
pubcrawl
Software measurement
Software
Organizations
biblio
Identification of the Impacts of Code Changes on the Security of Software
Submitted by aekwall on Mon, 02/10/2020 - 12:09pm
electronic commerce
software assurance
software lifetime
software code
security state
security assurance cases
security assurance case
security assessment time
open-source ERP software application
open-source e-commerce software application
Open Source Software
monitored security functions
incremental development
enterprise resource planning
code change impact
assurance case elements
Monitoring
security requirements
Scalability
safety-critical software
Java
code review
source code (software)
software maintenance
Unified modeling language
public domain software
tools
software security
composability
pubcrawl
security
biblio
Towards Automated Security Vulnerability and Software Defect Localization
Submitted by grigby1 on Mon, 02/10/2020 - 11:36am
program diagnostics
undiscovered vulnerabilities
tools
static code analysis
Software systems
software maintenance
software defects
software defect localization
software defect
security vulnerability
security vulnerabilities
security of data
security
resilience
static analysis
modern software
Defect Localization
Cybersecurity
Correlation
Computer bugs
bug
automated security vulnerability
Automated Secure Software Engineering
Resiliency
composability
Human behavior
pubcrawl
biblio
Share, But Be Aware: Security Smells in Python Gists
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
recurrent coding patterns
tools
static code analysis
static analysis
software security
software maintenance
share code snippets
security weaknesses
security smell
security breaches
security
safety-critical software
Resiliency
resilience
composability
Python
publicly-available Python Gists
publicly-available GitHub Gists
pubcrawl
program diagnostics
password
insecure coding practices
Human behavior
hard-coded secrets
hard-coded passwords
GitHub
Gist
encoding
biblio
A Comparative Analysis of Static Code Analysis Tools That Check Java Code Adherence to Java Coding Standards
Submitted by grigby1 on Mon, 02/10/2020 - 11:34am
Java programming language
testing
style
static code analysis tool
static code analysis
static analysis
standards
software quality
software maintenance
software development
Resiliency
resilience
quality
pubcrawl
program diagnostics
JPL Coding Standards
Concurrency
Java Coding Standards Enforcing Tools
Java code analysis
Java code adherence
Java
International Java Coding Standards
Human behavior
exceptions
critical system
concurrency (computers)
composability
Comparative Analysis
Coding Standard Analyzers
analyzers
security
« first
‹ previous
1
2
3
4
next ›
last »