Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security vulnerabilities
biblio
Towards Automated Security Vulnerability and Software Defect Localization
Submitted by grigby1 on Mon, 02/10/2020 - 11:36am
program diagnostics
undiscovered vulnerabilities
tools
static code analysis
Software systems
software maintenance
software defects
software defect localization
software defect
security vulnerability
security vulnerabilities
security of data
security
resilience
static analysis
modern software
Defect Localization
Cybersecurity
Correlation
Computer bugs
bug
automated security vulnerability
Automated Secure Software Engineering
Resiliency
composability
Human behavior
pubcrawl
biblio
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions
Submitted by grigby1 on Tue, 11/12/2019 - 4:25pm
Snyk platform
pattern classification
performing algorithm
performing models
Prediction algorithms
prediction models
Predictive models
predictive security metrics
pubcrawl
public databases
re-sampling strategies
security
security vulnerabilities
node security project
software metrics
software security issues
static source code metrics
Support vector machines
SVM
viable practical approach
Vulnerability
vulnerability information
vulnerable components
vulnerable functions
vulnerable javascript functions
Java
code fixing patches
code metrics
Computer crime
cyber-crime activities
Databases
dataset
deep learnin
deep learning
extensive grid-search algorithm
F-measure
forest based classifiers
GitHub
challenging machine
JavaScript
JavaScript programs
learning (artificial intelligence)
machie learning
machine learning
machine learning algorithms
Measurement
Metrics
mitigation techniques
natural language processing
nearest neighbour methods
biblio
An Approach for Trustworthiness Benchmarking Using Software Metrics
Submitted by aekwall on Mon, 07/01/2019 - 10:12am
Security Metrics
trustworthiness benchmarking
trustworthiness assessment model
Trusted Computing
Software systems
software security experts
software quality
software metrics
security vulnerabilities
security of data
Measurement
security attributes
security
pubcrawl
Mozilla Firefox project
Metrics
Buildings
Benchmark testing
metrics testing
biblio
Detection of protection-impacting changes during software evolution
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
Role Based Access Control
WordPress
web applications
static analysis
source code changes
source code (software)
software maintenance
software evolution
Software
security vulnerabilities
security regression
Security Impact of Changes
role-based access control
Access Control
Resiliency
RBAC security
pubcrawl
protection-impacting changes
negative security changes
Mathematical model
maintenance engineering
Image edge detection
composability
Automated Secure Software Engineering
authorisation
application security
biblio
Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and Solutions
Submitted by grigby1 on Fri, 02/22/2019 - 4:11pm
relational database security
Trademarks
tools
static code analysis
Static Analysis Tool
static analysis
SQL
security vulnerabilities
security of data
security
scalable static analysis
Resiliency
relational databases
applications code
pubcrawl
program diagnostics
PL/SQL server stack
Metrics
low false positives
Java EE
Java
Human behavior
Databases
Conferences
composability
C/C++ systems code
biblio
Leveraging Historical Versions of Android Apps for Efficient and Precise Taint Analysis
Submitted by grigby1 on Thu, 02/14/2019 - 11:19am
invasive software
user apps
tools
taint checking
taint analysis
simultaneous scalability
security vulnerabilities
security
representative precise taint analysis
real-world evolving Android apps
reachability analysis
pubcrawl
Open Source Software
mobile computing
Metrics
analysis effectiveness
incremental taint analysis
incremental
historical versions
Google
EVOTAINT
Evolution
differencing
composability
Benchmark testing
attacks
Android ecosystem
Android devices
Android (operating system)
android
biblio
A Study of Security Vulnerabilities on Docker Hub
Submitted by grigby1 on Mon, 06/11/2018 - 3:20pm
pubcrawl
Resiliency
security vulnerabilities
composability
resilience
Metrics
Docker Images
Vulnerability Propagation
Networked Control Systems Security
biblio
A Security Audit of the OpenPGP Format
Submitted by K_Hooper on Wed, 05/09/2018 - 10:56am
public domain software
OpenPGP
OpenPGP format
OpenPGP format specification
OpenPGP implementations
pattern classification
PGP
Production
Protocols
pubcrawl
open source Unix systems
Public key
Resiliency
Scalability
security audit
Security Audits
security vulnerabilities
Symantec PGP
Unix
email confidentiality
authorisation
computer security
context-free grammars
context-free languages
deterministic context free grammar
deterministic context free language
Electronic mail
email authenticity
authenticated package distributions
Formal Specification
GNU Privacy Guard
GnuPG
Grammar
Human behavior
language theoretical analysis
Language-theoretic security
malicious input data
biblio
Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
pubcrawl
testing
static analysis
Software patterns
Software
security vulnerabilities
security
Resiliency
resilience
arrays
nano-patterns
Metrics
Measurement
Java
Cryptography
Compositionality
Complexity theory
coding theory
biblio
Software Metrics as Indicators of Security Vulnerabilities
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
resilience
vulnerable software units
Software systems
software security vulnerabilities
software quality
software operational phase
software metrics
Software Architecture
software architectural characteristics
security vulnerabilities
security of data
security
search problems
Resiliency
coding theory
pubcrawl
nonvulnerable code
Metrics
heuristic search technique
function levels
file levels
Feature Selection
Cryptography
correlation coefficients
Correlation
Compositionality
Complexity theory
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »