Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
correctness
biblio
An Axiomatic Approach to Detect Information Leaks in Concurrent Programs
Submitted by grigby1 on Fri, 08/26/2022 - 10:24am
software engineering
leaky assertions
Information Leak
correctness
concurrent programs
axiomatic approach
Concurrency
Context
Concurrent computing
security
Software algorithms
Metrics
programming
real-time systems
composability
Resiliency
resilience
pubcrawl
biblio
An Analysis of Utility for API Recommendation: Do the Matched Results Have the Same Efforts?
Submitted by grigby1 on Wed, 01/20/2021 - 3:22pm
programming
utility
term frequency
software reliability
software quality
security
Resiliency
resilience
Reliability engineering
pubcrawl
API
evaluation
Current measurement
correctness
Conferences
Compositionality
application programming interface
APIs
API Recommendation
file
High-Coverage Testing of Softwarized Networks.pdf
Submitted by awhitesell on Mon, 10/15/2018 - 12:55pm
correctness
network verification
UIUC
UIUC
Automated Synthesis Framework for Network Security and Resilience
biblio
High Coverage Testing of Softwarized Networks
Submitted by awhitesell on Mon, 10/15/2018 - 12:55pm
correctness
network verification
UIUC
UIUC
UIUC
Automated Synthesis Framework for Network Security and Resilience
biblio
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation
Submitted by grigby1 on Tue, 01/16/2018 - 5:22pm
integrity
web services
verifiable delegated authorization protocol
user-centric architectures
third party Web services
Servers
Resiliency
pubcrawl
Protocols
privilege revocation
outsourcing
Outsourced Database Integrity
OAuth2 protocol
OAuth
Metrics
Access Control
identity
database updates
data structures
Data models
data access
Cryptography
Cryptographic Protocols
correctness
composability
Cloud Computing
cloud
authorization
authorisation
authenticated data structure protocol
file
Predicting Network Futures with Plankton
Submitted by thurlwel on Fri, 09/01/2017 - 10:03am
correctness
Network Troubleshooting
Hard Problems
biblio
Predicting Network Futures with Plankton
Submitted by thurlwel on Fri, 09/01/2017 - 10:03am
correctness
Network Troubleshooting
file
COCONUT: Seamless Scale-out of Network Elements
Submitted by thurlwel on Tue, 07/18/2017 - 11:33am. Contributors:
Soudeh Ghorbani
Brighten Godfrey
Science of Security
consistency
correctness
network functions
one big switch
one-to-many mapping
replications
software defined networking
Virtualization
weak causal consistency
Publications
A Hypothesis Testing Framework for Network Security
biblio
COCONUT: Seamless Scale Out of Network Elements
Submitted by thurlwel on Tue, 07/18/2017 - 11:23am
Science of Security
consistency
correctness
network functions
one big switch
one-to-many mapping
replications
software defined networking
Virtualization
weak causal consistency
A Hypothesis Testing Framework for Network Security
biblio
Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver
Submitted by grigby1 on Mon, 05/22/2017 - 1:02pm
Bagpipe
BGP
correctness
Domain-Specific Language
object oriented security
pubcrawl
Router Systems Security
Scalability
scalable verification
security scalability
solver-aided languages
1
2
next ›
last »