Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vulnerability detection
biblio
On Building a Vulnerability Dataset with Static Information from the Source Code
Submitted by aekwall on Tue, 05/10/2022 - 1:49pm
composability
codes
Compositionality
Data Breach
Databases
Human behavior
Industries
machine learning
Metrics
pubcrawl
Resiliency
software metrics
software security
static analysis
static code analysis
vulnerability detection
biblio
Feature Extraction Method for Cross-Architecture Binary Vulnerability Detection
Submitted by aekwall on Tue, 05/10/2022 - 1:49pm
Software
tools
feature extraction
Conferences
pubcrawl
Metrics
Resiliency
Human behavior
Compositionality
codes
vulnerability detection
binary vulnerability detection
Consumer electronics
cross-architecture
Intermediate language
similarity evaluation
biblio
Vulnerability Detection Algorithm of Lightweight Linux Internet of Things Application with Symbolic Execution Method
Submitted by aekwall on Tue, 05/10/2022 - 1:49pm
Compositionality
Fluctuations
Human behavior
information science
Internet of Things security (IoTS)
Linux
maintenance engineering
Manuals
Metrics
pubcrawl
Resiliency
Robustness
Stability analysis
Symbol execution
vulnerability detection
biblio
Agent-based ZeroLogon Vulnerability Detection
Submitted by aekwall on Tue, 05/10/2022 - 1:49pm
Intrusion Detection
pubcrawl
Metrics
Resiliency
Human behavior
cyber-physical systems
Compositionality
Telecommunications
intrusion detection system
control systems
Agent
Critical Vulnerability
domain controller
intrusion prevention
vulnerability detection
biblio
Comparison of Active Vulnerability Scanning vs. Passive Vulnerability Detection
Submitted by aekwall on Tue, 05/10/2022 - 1:48pm
Cryptography
information security
pubcrawl
Metrics
Resiliency
Human behavior
Compositionality
fault diagnosis
active vulnerability scanning
passive vulnerability detection
vulnerability detection
biblio
Performance Comparison on SQL Injection and XSS Detection using Open Source Vulnerability Scanners
Submitted by aekwall on Tue, 04/19/2022 - 11:27am
pubcrawl
vulnerability scanner
Vulnerability
tools
Time factors
SQL injection
security
Scalability
Resiliency
vulnerability detection
Open Source Software
data science
cross-site scripting
Cross Site Scripting (XSS)
Cross Site Scripting
Compositionality
Metrics
Human behavior
biblio
Machine Learning to Combine Static Analysis Alerts with Software Metrics to Detect Security Vulnerabilities: An Empirical Study
Submitted by grigby1 on Fri, 04/01/2022 - 2:47pm
Computing Theory
Security Metrics
codes
machine learning
Measurement
Metrics
pubcrawl
security
Software algorithms
software metrics
static analysis
static code analysis
tools
vulnerability detection
biblio
Binary Similarity Analysis for Vulnerability Detection
Submitted by aekwall on Tue, 05/18/2021 - 3:21pm
Binary Analysis
Binary Code Search
Binary codes
binary similarity
Compositionality
computer science
Human behavior
Measurement
Metrics
optimization
pubcrawl
Registers
Resiliency
Software
static analysis
vulnerability detection
biblio
An Efficient Vulnerability Extrapolation Using Similarity of Graph Kernel of PDGs
Submitted by aekwall on Tue, 05/18/2021 - 3:21pm
feature extraction
Resiliency
Human behavior
pubcrawl
privacy
Metrics
vulnerability detection
Labeling
Training
Compositionality
Open Source Software
Graph Kernel
supervised learning
extrapolation
program dependence graph
vulnerability extrapolation
biblio
An Automatic Vulnerability Scanner for Web Applications
Submitted by aekwall on Tue, 05/18/2021 - 3:20pm
Conferences
security
Resiliency
Human behavior
pubcrawl
privacy
Metrics
tools
testing
vulnerability detection
web security
Compositionality
vulnerability scanning
information collection
Web vulnerability
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »