Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
interactive systems
biblio
A Catalog of Security Architecture Weaknesses
Submitted by grigby1 on Fri, 02/02/2018 - 12:27pm
pubcrawl
weakness
Software systems
software reliability
software quality
software assurance
software architecture design
Software Architecture
security tactics
security of data
security design thinking
security bugs
security architecture weaknesses
security architectural flaw identification
secure software systems
Scalability
architectural choices
mitigation techniques
internet
interactive Web-based solution
interactive systems
Flaw
Computer bugs
computer architecture
composability
Common Architectural Weakness Enumeration
CAWE catalog
CAWE
authentication
architecture
architectural decisions
biblio
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild
Submitted by grigby1 on Mon, 12/04/2017 - 11:57am
Monitoring
Webcams
Trojan horses
tools
Resiliency
remote attackers interactive control
remote access trojans
remote access trojan
Rats
RAT malware
RAT
pubcrawl
botnets
Metrics
invasive software
interactive systems
human operator interaction
human computer interaction
honeypot
Electronic mail
DarkComet malware
darkcomet
Compositionality
biblio
Using Formal Models to Cross Check an Implementation
Submitted by grigby1 on Tue, 09/26/2017 - 11:35am
Compositionality
formal methods
interactive systems
Metrics
pubcrawl
Requirements
Resiliency
Scalability
scalable verification
traces
biblio
VarifocalReader #x2014; In-Depth Visual Analysis of Large Text Documents
Submitted by BrandonB on Tue, 05/05/2015 - 12:29pm
literary analysis
visual analytics
visual abstraction
varifocalreader
Text Mining
text documents
text analysis
Tag clouds
navigation
natural language processing
machine learning techniques
machine learning
Data mining
learning (artificial intelligence)
intermediate text levels
interactive systems
in-depth visual analysis
focus-context techniques
document handling
document analysis
distant reading
Data visualization
data visualisation
biblio
ETSSDetector: A Tool to Automatically Detect Cross-Site Scripting Vulnerabilities
Submitted by BrandonB on Tue, 05/05/2015 - 9:41am
interactivity
XSS attacks
web applications
vulnerabilities
testing
security of data
security
Qualifications
internet
Browsers
interactive systems
Filling
ETSSDetector
ETSS Detector
Databases
Data mining
cross-site scripting vulnerabilities
cross-site scripting
« first
‹ previous
1
2