Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software algorithms
biblio
A Test Cases Generation Technique Based on an Adversarial Samples Generation Algorithm for Image Classification Deep Neural Networks
Submitted by aekwall on Mon, 11/02/2020 - 2:47pm
Measurement
test cases generation technique
test cases generation
Software algorithms
Software
pubcrawl
program testing
Neural networks
neural nets
Metrics
metrics testing
adversarial samples
learning (artificial intelligence)
image classification deep neural networks
image classification
Filtering
DNN
deep learning
coverage metric
Classification algorithms
artificial intelligence tasks
adversarial samples generation algorithm
biblio
An AI Software Test Method Based on Scene Deductive Approach
Submitted by grigby1 on Mon, 11/02/2020 - 11:42am
Mathematical model
Software Testing
Software algorithms
Software
scene deductive approach
Scalability
road vehicles
pubcrawl
program testing
position control
AI software testing method
machine learning algorithms
intelligent tracking car
i/o systems security
i-o systems security
automobiles
artificial intelligence software
Artificial Intelligence
algorithm complexity
biblio
Insights into Malware Detection via Behavioral Frequency Analysis Using Machine Learning
Submitted by aekwall on Mon, 10/26/2020 - 12:11pm
known malware
malicious software
malicious activity
Microsoft Windows (operating systems)
machine learning models
behavioral frequency analysis
benign software
common defenses
common malware defenses
dynamic behavioral analysis
Predictive Metrics
Malware Behavioral Analysis
malware signature classifier
malware threat landscape
signature catalog
unknown malware
Windows API system function calls
zero-day
zero-day vulnerabilities
Metrics
malware detection
invasive software
machine learning algorithms
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
machine learning
malware
pattern classification
Analytical models
privacy
microsoft windows
Malware Analysis
application program interfaces
dynamic analysis
Software algorithms
biblio
Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries
Submitted by aekwall on Mon, 10/26/2020 - 11:46am
firmware binaries
critical cyber-physical IoT devices hinges
Cyber Physical System
cyber-physical execution semantic information
cyber-physical execution semantics
cyber-physical IoT control application domains
cyber-physical security flaws
domain-specific reverse engineering framework
domain-specific semantic information
dynamic selective memory protection
embedded binary code
embedded controller software binaries
embedded IoT controller software binaries
executables
Execution Semantic
control algorithm parameters
firmware vulnerability assessment
high-level algorithmic expressions
Linux kernel controllers versions
low-level binary symbolic values
memory forensics analysis
MISMO
reverse engineering outcomes
robotics
semantic-matching
state estimation algorithms
Symbolic Comparison
Symbolic Expression
targeted memory data attacks
Linux Operating System Security
Security analysis
security of data
Internet of Things
security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
Metrics
Data mining
public domain software
firmware
IoT
reverse engineering
Heuristic algorithms
program verification
control engineering computing
Semantics
Software algorithms
Predictive Metrics
Binary codes
operating system kernels
algorithmic level
algorithm-level semantics
binary patching
control algorithm
biblio
Evaluating the Performance of Machine Learning Sentiment Analysis Algorithms in Software Engineering
Submitted by aekwall on Mon, 09/28/2020 - 11:33am
Automated Secure Software Engineering
tool performance
software engineering domain
machine learning sentiment analysis algorithms
evaluation performance
datasets
automated sentiment tool
automated sentiment analysis
sentiment analysis
Software algorithms
Benchmark testing
machine learning algorithms
software engineering
Data mining
machine learning
Training
tools
composability
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Security Improvement of Common-Key Cryptographic Communication by Mixture of Fake Plain- Texts
Submitted by grigby1 on Fri, 09/04/2020 - 3:25pm
common-key cryptographic communication
brute force attacks
Software algorithms
security improvement
legal plaintext
fundamental methods
fake plaintexts
fake plain-texts
decryption keys
cryptogram
concrete encryption-decryption algorithm
common-key cryptosystem
encryption
Common Key Cryptosystem
Brute Force Attack
policy-based governance
Human Factors
Computers
Law
eavesdropper
collaboration
pubcrawl
public key cryptography
telecommunication security
biblio
Same App, Different Countries: A Preliminary User Reviews Study on Most Downloaded iOS Apps
Submitted by grigby1 on Thu, 07/30/2020 - 2:33pm
iOS Security
User Reviews Analysis
US App Store
Text Mining
software maintenance
software evolution
requirement engineering
preliminary user reviews study on most downloaded iOS apps
mobile app reviews
mining
differentiate reviews
App Store Analytics
analyzing user reviews
643 user reviews
300 user reviews
15 most downloaded iOS apps
security
Google
Software algorithms
operating systems (computers)
Compositionality
Metrics
mobile computing
software quality
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Forestry
Data mining
biblio
Agile Release Planning Using Natural Language Processing Algorithm
Submitted by aekwall on Mon, 05/18/2020 - 10:54am
agile release planning
word corpus
user story
team working
software prototyping
similar user stories
RV coefficient NLP algorithm
Release Planning
Rally
R Programming
provided user stories
project release
natural language processing algorithm
JIRA
Java utility
complex software engineering projects
Scalability
agile methodology
project management
Algorithm
Currencies
Software algorithms
Java
software development management
software engineering
natural language processing
Planning
pubcrawl
Human behavior
Resiliency
Software
biblio
Open-TEE is No Longer Virtual: Towards Software-Only Trusted Execution Environments Using White-Box Cryptography
Submitted by grigby1 on Fri, 04/17/2020 - 10:57am
Secure storage
WhiteBox-TEE
white-box cryptography
White Box Security
trusted execution environments
Trusted Execution Environment
tools
telecommunication security
TEE-enabled device
SPACE algorithm
Software algorithms
Software
security properties hardware TEEs
composability
Resiliency
resilience
pubcrawl
Open-TEE
open-source GlobalPlatform-compliant software TEE emulator
Mobile handsets
Metrics
Hardware
GP TEE specifications
Cryptography
Compositionality
biblio
Modification and Optimization of Solovey-Strassen's Fast Exponentiation Probablistic Test Binary Algorithm
Submitted by aekwall on Mon, 01/20/2020 - 11:48am
optimization
test
Solovey-Strassen fast exponentiation probablistic test binary algorithm
Solovey-Strassen
Software algorithms
Scalability
Resiliency
pubcrawl
probability test
probability
Probabilistic logic
Algorithm
Jacobian matrices
Jacobi symbol
Information systems
Fermat's little theorem
Fermat
exponentiation
C\# programming language
C\# languages
Cryptography
binary exponentiation
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »