Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software
biblio
Programmable management framework for evolved SDN
Submitted by BrandonB on Wed, 05/06/2015 - 9:56am
OSGI
telecommunication network management
software-defined networking
software radio
Software
security
SDN philosophy
SDN networks
SDN manager
SDN architecture
SDN
Protocols
programmable management framework
PDEE
autonomic network management
on-the-fly code update
network management
management functions
IP networks
Hardware
FIPA
evolved SDN
distributed execution environment
control systems
computer architecture
codes
code lifecycle management
bottom-up approach
biblio
A Software Defined Self-Aware Network: The Cognitive Packet Network
Submitted by BrandonB on Wed, 05/06/2015 - 9:56am
SAN
telecommunication security
telecommunication computing
Storage area networks
software radio
software defined self-aware network
Software Defined Networks
Software
self-aware networks
self-aware computer network
security
SDN
autonomic communications
quality of service
QoS
network security
measurement based goal driven behaviour
energy savings
energy consumption
delays
CPN
cognitive radio
cognitive packet network
biblio
Multidimensional Diversity Employment for Software Behavior Encryption
Submitted by BrandonB on Wed, 05/06/2015 - 9:54am
multidimensional software diversity employment
system resilience
System recovery
spatiotemporal software behavior encryption
Spatiotemporal phenomena
software monoculture
software fault tolerance
Software
security provisioning
security level
Runtime
resilience
online programmable software-execution foundation separating logic
multidimensional systems
autonomic failure recovery mechanism
moving target defense
encryption
Employment
diffusion levels
Cryptography
confusion levels
computational cost
computational complexity
ChameleonSoft recovery mechanisms
ChameleonSoft Behavior Encryption
CBE mechanism
behaviorally-mutated functionally-equivalent code variants
avalanche effect percentage
biblio
Malicious data classification using structural information and behavioral specifications in executables
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
Software
malwares
NtTrace
obfuscation technology
pattern classification
program diagnostics
security devices
signature database
signature-based detection system
malware detection system efficiency improvement
static analysis
structural information
Syntactics
system calls
threat detection
threat mitigation
underground Internet economy
zero-day malware detection
internet
antivirus
automated malicious programs
behavioral specifications
Classification algorithms
dynamic analysis
executable file
feature extraction
Information systems
Algorithm design and analysis
invasive software
malicious behavior extraction
malicious data classification
malicious software detection
malicious software mitigation
malware
malware detection
malware detection system effectiveness improvement
biblio
Utilizing Attack Graphs to Measure the Efficacy of Security Frameworks across Multiple Applications
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
attack graph analysis
attack graphs
attack surface
authentication
graph theory
information security
Measurement
security frameworks
security of data
Servers
Software
Vectors
biblio
Multidimensional Diversity Employment for Software Behavior Encryption
Submitted by BrandonB on Tue, 05/05/2015 - 11:22am
multidimensional software diversity employment
system resilience
System recovery
spatiotemporal software behavior encryption
Spatiotemporal phenomena
software monoculture
software fault tolerance
Software
security provisioning
security level
Runtime
resilience
online programmable software-execution foundation separating logic
multidimensional systems
autonomic failure recovery mechanism
moving target defense
encryption
Employment
diffusion levels
Cryptography
confusion levels
computational cost
computational complexity
ChameleonSoft recovery mechanisms
ChameleonSoft Behavior Encryption
CBE mechanism
behaviorally-mutated functionally-equivalent code variants
avalanche effect percentage
biblio
Web Application Vulnerability Prediction using Hybrid Program Analysis and Machine Learning
Submitted by BrandonB on Tue, 05/05/2015 - 10:55am
Data models
empirical study
HTML
input validation and sanitization
program analysis
security
security measures
Semisupervised learning
Servers
Software
Training
Vulnerability prediction
biblio
Security Testing Based on Attack Patterns
Submitted by BrandonB on Tue, 05/05/2015 - 10:48am
security
Unified modeling language
UML state machine
UML state charts
testing
SQL injection
software prototyping
Software
security testing
security of data
Adaptation models
program testing
model-based testing
internet
HTML
Databases
cross-site scripting
attack patterns
attack pattern
agile software development processes
biblio
A context-sensitive approach for precise detection of cross-site scripting vulnerabilities
Submitted by BrandonB on Tue, 05/05/2015 - 10:41am
precise detection
XSS vulnerability
XSS attacks
Web application
vulnerability detection
taint analysis
standards
source code (software)
source code
software development life cycle
Software
social communication
Servers
sensitive information
security
Browsers
malware
malicious user
malicious operation
invasive software
internet
hypermedia markup languages
HTML
health services
financial transaction
defensive programming based HTML context-sensitive approach
cross-site scripting vulnerability
cross-site scripting
Context
biblio
Static analysis approaches to detect SQL injection and cross site scripting vulnerabilities in web applications: A survey
Submitted by BrandonB on Tue, 05/05/2015 - 10:40am
SQLI
social communications
Software
software development life cycle
software maintenance
software reliability
source code
source code (software)
SQL
SQL injection
Servers
static analysi
static analysis
testing
vulnerabilitie
vulnerability detection
web applicatio
web applications
XSS
legacy Web applications
attack prevention
Cross Site Scripting
cross site scripting vulnerabilities
defensive programming
financial transaction
Guidelines
health problem
internet
Analytical models
malicious users
Manuals
program diagnostics
programming
programming mistakes
security of data
security vulnerabilities
security weaknesses
« first
‹ previous
…
72
73
74
75
76
77
78
79
80
next ›
last »