Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software bugs
biblio
Cross-Entropy: A New Metric for Software Defect Prediction
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
pubcrawl
Task Analysis
source code (software)
source code
software repository
software quality assurance
software quality
software metrics
software defect prediction
software bugs
Software
Semantics
recurrent neural network language model
recurrent neural nets
code metric
program debugging
predictive security metrics
Predictive models
natural language processing
Metrics
Measurement
language model
Entropy
DefectLearner
deep learning
cross-entropy
Computer bugs
code naturalness
biblio
T-Fuzz: Fuzzing by Program Transformation
Submitted by grigby1 on Thu, 02/14/2019 - 11:20am
program analysis
tools
taint analysis
t-fuzz approach
symbolic execution-based approach
software bugs
Software
security of data
security
randomly generated inputs
pubcrawl
program verification
program transformation
program testing
program diagnostics
program debugging
bug finding
Metrics
Libraries
input mutation techniques
input checks
fuzzing transformed programs
fuzzing
fuzzer-generated inputs
Fuzz
dynamic tracing based technique
deep execution paths
coverage-guided fuzzer
Computer bugs
composability
code paths
biblio
Mitigating Cyber Security Attacks by Being Aware of Vulnerabilities and Bugs
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
software programs
private data
program debugging
pubcrawl
resilience
Resiliency
security
security of data
software bugs
prevention techniques
tools
user bank accounts
valuable assets
virtualized system
Vulnerabilities and Bugs
vulnerability concepts
vulnerable applications
Windows operating system
Kali Linux
attack methodologies
composability
Computer bugs
cyber security
cyber security attacks
cyber-attack
defence strategies
internet
antivirus software
Linux
Metasploit Framework
Metrics
Nmap
operating system level
Penetration Test
Penetration Testing
biblio
Static analysis for web service security - Tools amp; techniques for a secure development life cycle
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
Web Application Security
SOA
SOAP
software bugs
Software verification
Source code analysis
Static Analysis Tool
static code analysis
strategic components
ubiquitous IoT
vulnerabilities detection
vulnerability identification
Simple object access protocol
web applications
Web service security
web services
Web services guidelines
Web Services Security
WS-SecureConversation
WS-security
XML
XML encryption
XML signature
program verification
critical national infrastructure
Cryptography
dynamic analysis
enterprise software ecosystem
Heartbleed
information exchange
mission critical API
Mobile Applications
Open Web Application Security Project
Penetration Testing
program diagnostics
Computer crime
public deployments
public sector infrastrucure development life cycle
Secure Software Development
security challenges
Security Code Review
service development paradigm
service oriented architecture
service-oriented architecture
services security
Shellshock