Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vulnerability detection
biblio
Formulation of SQL Injection Vulnerability Detection as Grammar Reachability Problem
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
Access Control
Compositionality
cross-site scripting
flow graphs
Grammar
Human behavior
Metrics
Production
pubcrawl
reachability analysis
Resiliency
SQL injection
static analysis
vulnerabilities detection
vulnerability detection
Web application
biblio
Vulnerability Detection on Mobile Applications Using State Machine Inference
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
Mobile Applications
vulnerability detection
testing methodology
testing
state machine learning
state machine inference
security violations
security of data
security
Resiliency
pubcrawl
program testing
model inference
mobile computing
Android (operating system)
mobile application security
Mobile Application
mobile Android applications
Metrics
machine learning
learning (artificial intelligence)
Inference algorithms
Humanoid robots
Human behavior
finite state machines
Compositionality
Androids
biblio
The detection of hybrid vulnerabilities and effects on the basis of analyzing the information activity in cyberspace
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
pubcrawl
vulnerability detection
technical systems
system of early detection
system implementation
structural synthesis
socio systems
social systems
security of data
Resiliency
Compositionality
parametric synthesis
Metrics
information hybrid threats
information activity
hybrid vulnerabilities
hybrid threats
Human behavior
early efficient detection
Cyberspace
biblio
Development of a suite of IPv6 vulnerability scanning tests using the TTCN-3 language
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
test maintainability
program testing
Protocols
Prototypes
pubcrawl
Resiliency
security of data
specification languages
telecommunication computing
telecommunication security
test extensibility
passive analysis
test specification language
testing
Testing and Test Control Notation version 3
transport protocols
TTCN-3
TTCN-3 language
vulnerability assessment
vulnerability detection
Vulnerability Management
vulnerability scanning
Human behavior
application security
attacks simulation
Compositionality
Computer crime
denial of service
denial-of-service attack detection
Device Security
dual-stack networks
Duplicate Address Detection
Formal Specification
Address autoconfiguration
ICMPv6 Protocol
internet
IP networks
IPv4 IPv6 protocol
IPv6
IPv6 networks
IPv6 vulnerability scanning tests
Linux
Metrics
network communications
biblio
Intrusion detection systems vulnerability on adversarial examples
Submitted by grigby1 on Mon, 01/21/2019 - 12:14pm
Intrusion Detection Systems
vulnerability detection
Training
security of data
security events
Resiliency
pubcrawl
Neurons
Metrics
intrusion detection systems vulnerability
adversarial examples
Intrusion Detection
Human behavior
Compositionality
Classification algorithms
Biological neural networks
attack vector
anomaly-based intrusion detection
anomaly detection systems ability
Anomaly Detection
biblio
Precise Detection of Side-Channel Vulnerabilities Using Quantitative Cartesian Hoare Logic
Submitted by K_Hooper on Wed, 05/02/2018 - 10:45am
composability
Metrics
pubcrawl
side channels
static analysis
taint analysis
verification
vulnerability detection
biblio
MalFire: Malware firewall for malicious content detection and protection
Submitted by K_Hooper on Wed, 04/04/2018 - 10:00am
malicious content protection
Web servers
vulnerability detection
user data security
user data privacy
tools
sensitive information
security
Resiliency
pubcrawl
privacy
online portion
Metrics
malware injection
malware firewall
malware
ad blocking tool
malicious content detection
MalFire
IP networks
invasive software
internet
Human behavior
firewalls
data privacy
Content Injection
contemporary threats
Compositionality
Companies
adware injection
adware content
Adware
biblio
A hybrid model for anomaly-based intrusion detection in SCADA networks
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
learning (artificial intelligence)
Zero-day attacks
vulnerability detection
vulnerabilities
supervisory control and data acquisition systems
security of data
SCADA systems
SCADA networks
robust hybrid model
Resiliency
pubcrawl
Protocols
Metrics
machine learning approach
machine learning
anomaly-based Intrusion Detection Systems
Intrusion Detection
industrial control system dataset
industrial control system
industrial control
Human behavior
feature selection model
Feature Selection
feature extraction
fabrication
Distributed Analytics and Security Institute Mississippi State University Starkville
Cybersecurity
Computational modeling
Compositionality
biblio
Malware Detection for Secure Microgrids: CoSSMic Case Study
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
Microgrids
vulnerability detection
SmartGrid
smart-devices
security vulnerability
security threats
security
sandbox
Resiliency
pubcrawl
Protocols
power system security
power engineering computing
performance evaluation
Monitoring
Compositionality
microgrid ecosystem
microgrid
Metrics
malware detection
malware
invasive software
Human behavior
energy infrastructure
electric microgrids
distributed power generation
Cybersecurity
cyber vulnerabilities
CoSSMic project
biblio
Game-theory based detection and prevention of DoS attacks on networking node in open stack private cloud
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
openstack
vulnerability detection
Virtualization
Virtual machining
Stochastic game
Stochastic Computing Security
Servers
security
Resiliency
pubcrawl
cloud
Metrics
IP networks
Human behavior
Games
Game-Theory
DoS attack
DHCP attack
Compositionality
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »