Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software maintenance
biblio
SQL-Identifier Injection Attacks
Submitted by grigby1 on Mon, 02/10/2020 - 11:25am
prepared-statement API
SQL-identifier injection attacks
SQL-ID IAs
SQL statements
SQL injection
SQL detection
SQL
software reliability
software maintenance
security of data
Resiliency
resilience
pubcrawl
privacy
automated analysis
policy-based governance
Metrics
Java
injecting identifiers
Human behavior
health care
GitHub
electronic medical record software
electronic health records
confidential patient information
collaboration
code vulnerability
biblio
Container Cluster Model Development for Legacy Applications Integration in Scientific Software System
Submitted by aekwall on Mon, 10/28/2019 - 10:38am
MD - SLAG – MELT
computing applications
container
container cluster model development
containerization systems
distributed computer simulation
high-efficiency computing
high-performance computing
intellectual processing
legacy applications integration
mathematical analysis
computer software
MD-SLAG-MELT system
modern scientific information systems
molecular dynamic Modeling
nonstandardized interfaces
programming languages
scientific software system
system MD-SLAG-MELT
ubiquitous computing
Scientific Computing Security
Load modeling
Big Data
computer architecture
Resiliency
pubcrawl
Computational modeling
database
Databases
Software systems
software maintenance
Containers
Servers
pattern clustering
business data processing
visualization
Predictive Metrics
scientific information systems
Compositionality
cluster
computer experiments results
computer simulation systems
biblio
Safe Automated Refactoring for Intelligent Parallelization of Java 8 Streams
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
semantics-preserving fashion
policy-based governance
pubcrawl
Refactoring
resilience
Resiliency
running operations
safe automated refactoring
Safe Coding
Semantics
Pipelines
sequential streams
software maintenance
static analysis
Stream API
stream code
stream operations
streams
typestate analysis
Writing
Instruction sets
automated refactoring approach
automatic parallelization
collaboration
data structures
finite data structures
Human behavior
Human Factors
Image color analysis
infinite data structures
application program interfaces
intelligent parallelization
Java
Java 8
lambda expression side-effects
mainstream object-oriented programming languages
MapReduce-style operations
Metrics
optimizing stream code
parallel streams
biblio
Detection of protection-impacting changes during software evolution
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
Role Based Access Control
WordPress
web applications
static analysis
source code changes
source code (software)
software maintenance
software evolution
Software
security vulnerabilities
security regression
Security Impact of Changes
role-based access control
Access Control
Resiliency
RBAC security
pubcrawl
protection-impacting changes
negative security changes
Mathematical model
maintenance engineering
Image edge detection
composability
Automated Secure Software Engineering
authorisation
application security
biblio
Reducing Attack Surface via Executable Transformation
Submitted by grigby1 on Fri, 02/08/2019 - 4:32pm
security
office of naval research
ONR
overwhelming emphasis
Productivity
programmers productivity
pubcrawl
resilience
Resiliency
Scalability
obscure use cases
security of data
Software
software engineering
software engineering history
software maintenance
software reusability
telecommunication security
total platform cyber protection
TPCP
individual approaches
Binary
binary transformation
Complexity theory
Conferences
constant demands
de-bloat software binaries
Debloat
deployment practices
executable transformation
attack surface
individual decisions
Late Stage Customization
Libraries
maximal code reuse
Metrics
minimal developer effort
modern software development
Navy
biblio
Design of heterogeneous integrated digital signature system for ensuring platform independence
Submitted by grigby1 on Fri, 09/28/2018 - 3:12pm
per-user contract management features
WAS
User Terms
software maintenance
software extension
Software
Scalability
resilience
pubcrawl
platform independence
platform
browser environment
Insurance
HTML5
heterogeneous integrated digital signature system
digital transactions
digital signatures
digital signature
contracts
Companies
Browsers
biblio
Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
SQL injection
privacy
program testing
pubcrawl
Regular Expression Inference
Resiliency
search problems
software maintenance
SQL
Policy-Governed Secure Collaboration
SQL Injection attacks
testing
vulnerabilities detection
vulnerable WAFs
WAF rule set
web application firewalls
Web application firewalls repair
web security
Human behavior
collaboration
combinatorial mathematics
combinatorial optimisation problem
Decision trees
filter rules
firewalls
Firewalls (computing)
genetic algorithms
Automated Testing
internet
learning (artificial intelligence)
legitimate requests
machine learning
multiobjective genetic algorithms
Policy
policy-based governance
biblio
A Support Vector Machine Based Approach for Code Smell Detection
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
resilience
Training
SVMCSD
Support vector machines
support vector machine
Software systems
software quality
software metrics
software maintenance
software developers
Resiliency
Anti-patterns
public domain software
pubcrawl
Metrics
Measurement
learning (artificial intelligence)
DETEX
computer science
composability
code smells
code smell detection
biblio
Models of Reliability of Fault-Tolerant Software Under Cyber-Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
Software
on-demand software
Probabilistic logic
probabilistic model
pubcrawl
resilience
Resiliency
Scalability
security of data
noncompromised software
software fault tolerance
software fault-tolerance
software maintenance
software maintenance policies
software reliability
sophisticated synchronized attacks
synchronized attacks system reliability
telecommunication security
fault tolerant architecture
adversary
Adversary Models
computer security
cyber-attacks
cyber-security controls
diverse software
failure regions
fault tolerance
adequate adversary model
Fault tolerant systems
fault-tolerant software
Human behavior
independent attacks
industrial control applications
industrial protection systems
Metrics
biblio
Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
security of data
Industrial Control Systems
Integrated circuit modeling
legacy systems
Metrics
process invariants
pubcrawl
resilience
Resiliency
security
industrial control
security requirements
security specifications
software maintenance
timed automata
UPPAAL
Valves
water supply
water treatment
computer security
and Cyber Physical Systems
Attack detection
attack detection mechanisms
automata
automata theory
Clocks
coding theory
Compositionality
6-stage operational water treatment plant
critical infrastructure
Cryptography
Cyber Attack Detection
cyber attack prevention
cyber security
formal methods
formal verification
ICs
« first
‹ previous
1
2
3
4
next ›
last »