Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vulnerability detection
biblio
Two-Level Algebraic Method for Detection of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 2:41pm
Human behavior
vulnerability pattern matching
vulnerability detection
Vulnerability
vulnerabilities detection
two-level algebraic method
Symbolic Execution
Semantics
Resiliency
pubcrawl
pattern matching
model checking
Metrics
Mathematical model
algebra
fuzzing
Formal Specification
formal methods
exploit
Cybersecurity
Compositionality
Buffer overflows
Binary codes
binary code
behavior matching
behavior algebra
algebra expressions
biblio
Research on Linkage Model of Network Resource Survey and Vulnerability Detection in Power Information System
Submitted by aekwall on Mon, 02/17/2020 - 2:41pm
information security
Vulnerability Verification
vulnerability scanning
Resource Survey
power information network resource survey
power information network management
Power Information Network
network resource survey
linkage model
information networks
Couplings
Compositionality
Graphics
security of data
power systems
power information system
Information systems
power engineering computing
tools
vulnerability detection
Metrics
pubcrawl
Human behavior
Resiliency
IP networks
biblio
Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
static analysis challenge
program compilers
program diagnostics
pubcrawl
resilience
Resiliency
security of data
Semantics
Software
static analysis
program behavioral problems
static code analysis
static detection
static vulnerability detection
static vulnerability detectors
Training
vulnerabilities
vulnerability detection
vulnerable program
graph embedding
composability
Computer bugs
Compositionality
control-flow
control-flow-related vulnerabilities
Convolutional codes
feature extraction
general static analysis solutions
graph convolutional network
CFR vulnerabilities
graph embedding approach
graph theory
high-level control-flow information
high-level control-flow related vulnerabilities
Human behavior
learning (artificial intelligence)
machine-learning-based approaches
program analysis
biblio
Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
smart grid devices
power system
power system security
predefined vulnerability patterns
program diagnostics
resilience
Safety
security of data
security threats
power grid vulnerability analysis
Smart Grids
smart meters
smart power grids
smart terminals
Syntactics
terminal devices
terminal security
vulnerability detection
Compositionality
pubcrawl
Human behavior
composability
Resiliency
Analytical models
automatic static analysis
buffer-overflow vulnerabilities
buffer-overflow vulnerability detection
static analysis
Computer bugs
device program information
error reporting
feature extraction
Metrics
modern power transmission network
power engineering computing
biblio
Detecting Blind Cross-Site Scripting Attacks Using Machine Learning
Submitted by aekwall on Mon, 08/05/2019 - 10:42am
composability
Cross Site Scripting
Cross-site scripting (XSS)
governence
Human behavior
Information Assurance
machine learning
Metrics
policy-based governance
pubcrawl
Resiliency
Scalability
software security
vulnerability detection
web security
biblio
Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded Web Servers
Submitted by aekwall on Wed, 05/01/2019 - 12:43pm
Router Systems Security
automated
composability
embedded systems
IoT firmware
large scale
Metrics
pubcrawl
Resiliency
vulnerability detection
biblio
Discovering Software Vulnerabilities Using Data-flow Analysis and Machine Learning
Submitted by grigby1 on Mon, 01/21/2019 - 12:16pm
Compositionality
Cross Site Scripting
data-flow analysis
Human behavior
machine learning
Metrics
pubcrawl
Resiliency
Scalability
software security
static code analysis
vulnerability detection
biblio
Machine Learning Methods for Software Vulnerability Detection
Submitted by grigby1 on Mon, 01/21/2019 - 12:16pm
buffer overflow
Compositionality
Human behavior
machine learning
Metrics
N-grams
pubcrawl
Resiliency
software metrics
static analysis
suffix trees
vulnerability detection
biblio
Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
Compositionality
deep learning
Human behavior
integer overflow
Metrics
Neural networks
pubcrawl
Resiliency
vector representations
vulnerability assessment
vulnerability detection
biblio
Vulnerability Detection for Source Code Using Contextual LSTM
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
CLSTM
component
Compositionality
Conferences
Human behavior
Informatics
Metrics
neural network
pubcrawl
Resiliency
vulnerability detection
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »