Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vulnerability detection
biblio
SWAN\_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods
Submitted by aekwall on Mon, 09/28/2020 - 11:33am
novel automated machine-learning approach SWAN
software metrics
graphical user interfaces
machine-learning
active machine learning
authentication methods
bug detection
code-specific methods
IntelliJ plugin
program debugging
program analysis
security-relevant methods
semiautomated detection
SRM
static analysis tools
SWAN\_ASSIST aids developers
SWAN\_ASSIST tool
time exactly those methods whose classification best impact
machine learning
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
vulnerability detection
Training
Libraries
security
authentication
public domain software
software maintenance
Automated Secure Software Engineering
Java
program diagnostics
software quality
biblio
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
IoT privacy
composability
catastrophic accidents
corresponding graph-based analysis
cross-layer formal framework
cross-layer vulnerability detection framework
design flaws
device firmware
ForeSee
high-level decision-making processes
network protocols
long sequence
low-level physical surroundings
Multiple layer
multiple layers
physical environment
potential attack paths
severe threats
system configurations
Cross Layer Security
Intrusion Detection
Internet of Things
IoT devices
Internet of Things (IoT)
Resiliency
pubcrawl
graph theory
Protocols
Vulnerability Analysis
Decision Making
security of data
firmware
IoT security
vulnerability detection
cyber security
security issues
IoT systems
attack graph
Internet-of-Things devices
model checking
biblio
Hardening the Core: Understanding and Detection of XNU Kernel Vulnerabilities
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
Compositionality
iOS Security
XNU kernel vulnerability
XNU kernel vulnerabilities
macOS/iOS kernel XNU
KInspector framework
feedback-based fuzzing techniques
feedback based fuzzing
common application vulnerabilities
statistical analysis
Manuals
operating system kernels
fuzzing
security of data
empirical study
Instruments
Human Factors
Engines
security vulnerabilities
vulnerability detection
Metrics
pubcrawl
Resiliency
Kernel
security
biblio
DifFuzz: Differential Fuzzing for Side-Channel Analysis
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
dynamic analysis
predictability
Security Heuristics
unknown side-channel vulnerabilities
secret-dependent paths
secret program data
resource-guided heuristics
resource usage
resource consumption
Performance analysis
Java programs
fuzzing-based approach
DifFuzz
differential fuzzing
side-channel attacks
side-channel analysis
security of data
fuzzing
side-channel
Time factors
Instruments
execution time
program diagnostics
Java
Correlation
tools
vulnerability detection
pubcrawl
Resiliency
Cryptography
Scalability
biblio
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
Open Source Software
vulnerable code public
unpatched OSS versions
software vendors
security patches mapping
security patch database
security fixes
secretly patched vulnerabilities
secret security patches
n-day attacks
easy software development management
BoringSSL
armored attackers
0-day vulnerability
0-day attacks
security patch
security of data
Compositionality
software maintenance
software development management
public domain software
Computer bugs
machine learning
Training
Databases
vulnerability detection
Metrics
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
security
biblio
A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
flow-based intrusion detection
vulnerability detection
Compositionality
IoT networks
anomaly detection system
CICIDS2017 dataset
edited nearest neighbors
flow-based anomaly detection
flow-based features extraction
network traffic
level-1 model
level-2 model precision
malicious activity detection
recursive feature elimination
sampling methods
synthetic minority over-sampling technique
two-level hybrid anomalous activity detection
UNSW-15 dataset
Human behavior
security of data
telecommunication traffic
Internet of Things
Protocols
nearest neighbour methods
feature extraction
machine learning
Resiliency
Intrusion Detection
pubcrawl
Metrics
pattern classification
vulnerabilities
Training
Cybersecurity
Anomaly Detection
biblio
Algebraic Patterns of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
sockets
symbolic modelling
rewriting rules
pattern creation
cyber reasoning systems
behaviour algebra
algebraic patterns
algebraic matching methods
algebraic matching
algebraic approach
algebra equations
Binary codes
binary code
Buffer overflows
Registers
Compositionality
Semantics
algebra
program diagnostics
pattern matching
vulnerability detection
Metrics
pubcrawl
Human behavior
Resiliency
biblio
Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
android
vulnerabilities detection approach
system call
security vulnerabilities detection
security bugs
malicious Android application
detection process
detection algorithm
cyber attackers
Android security vulnerabilities
Android operating systems
system calls
anomaly detection techniques
Compositionality
Android (operating system)
security
vulnerability detection
Measurement
security vulnerabilities
Computer bugs
Anomaly Detection
Correlation
Metrics
machine learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
invasive software
Software
biblio
Research on Mobile Application Local Denial of Service Vulnerability Detection Technology Based on Rule Matching
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
formal verification
static detection method
smali abstract syntax tree
rule matching
mobile-application
mobile application market
malicious application flooding
local denial of service vulnerability detection technology
hook verification
dynamic detection method
-static-detection
-security-vulnerability
-rule-matching
-dynamic-detection
Computer crashes
Monitoring
Compositionality
smart phones
vulnerability detection
Communication networks
Mobile Applications
pattern matching
Metrics
pubcrawl
Human behavior
Resiliency
feature extraction
mobile computing
invasive software
security
biblio
A Study on Container Vulnerability Exploit Detection
Submitted by aekwall on Mon, 02/17/2020 - 2:41pm
Anomaly Detection
static vulnerability attack detection schemes
dynamic vulnerability attack detection schemes
dynamic anomaly detection scheme
Docker Images
container vulnerability exploit detection
Container Security
cloud computing infrastructures
Compositionality
Image Processing
Heuristic algorithms
vulnerability detection
Containers
security of data
tools
Databases
Metrics
pubcrawl
Human behavior
Resiliency
machine learning
learning (artificial intelligence)
feature extraction
security
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »