Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Jan'17
file
Sun_SigPID_Ja.pdf
Submitted by Jamie Presken on Thu, 12/08/2016 - 9:07am
CMU
Jan'17
file
Li_DroidClassifier_JA.pdf
Submitted by Jamie Presken on Thu, 12/08/2016 - 9:02am
Android Malware Detection
CMU
HTTP Network Traffic
Jan'17
Malware Clas- sification
Mobile Security
biblio
DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware
Submitted by Jamie Presken on Thu, 12/08/2016 - 9:02am
Android Malware Detection
CMU
HTTP Network Traffic
Jan'17
Malware Clas- sification
Mobile Security
CMU
Jan'17
file
Rattanasuksun_RRF_JA.pdf
Submitted by Jamie Presken on Thu, 12/08/2016 - 8:56am
CMU
Jan'17
biblio
RRF: A Race Reproduction Framework for Use in Debugging Process-Level Races
Submitted by Jamie Presken on Thu, 12/08/2016 - 8:56am
CMU
Jan'17
CMU
Jan'17
file
Bogart_How_to_break_API_CK.pdf
Submitted by Jamie Presken on Thu, 12/08/2016 - 8:24am
CMU
collaboration
Dependency management
Jan'17
Qualitative research
semantic versioning
Software ecosystems
biblio
How to break an API: cost negotiation and community values in three software ecosystems
Submitted by Jamie Presken on Thu, 12/08/2016 - 8:22am
CMU
collaboration
Dependency management
Jan'17
Qualitative research
semantic versioning
Software ecosystems
CMU
Jan'17
file
Hibshi_Improving_Security_TB.pdf
Submitted by Jamie Presken on Thu, 12/08/2016 - 7:20am
CMU
Fuzzy logic
Jan'17
recommender system
scenarios
security requirements
type-2
uncertainty
user study
vignettes
biblio
Improving Security Requirements Adequacy An Interval Type 2 Fuzzy Logic Security Assessment System
Submitted by Jamie Presken on Thu, 12/08/2016 - 7:20am
CMU
Fuzzy logic
Jan'17
recommender system
scenarios
security requirements
type-2
uncertainty
user study
vignettes
CMU
Jan'17
file
Hosseini_Lexical_Similarity_TB.pdf
Submitted by Jamie Presken on Wed, 12/07/2016 - 1:08pm
CMU
Jan'17
« first
‹ previous
1
2
3
4
next ›
last »