Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Open Source Software
biblio
A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence
Submitted by grigby1 on Fri, 07/10/2020 - 11:55am
security forums
learning (artificial intelligence)
machine learning
machine learning-based crawler
Monitoring
Open Source Software
open-source tools
pubcrawl
security
language models
security Web sites
service-oriented architecture
social networking (online)
social web
statistical language modelling techniques
Task Analysis
telecommunication security
tools
hacker forums
crawler architecture
Crawlers
crawling architecture
cyber security
cyber threat intelligence
cyber-security information
dark web
data harvesting
Computer crime
harvested information
Human behavior
Human Factors
information gathering task
Internet of Things
IoT
IoT-related cyber-threat intelligence
biblio
Modular Vulnerability Indication for the IoT in IP-Based Networks
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
Reconnaissance
modular vulnerability indication
multiple tools
Network reconnaissance
network scanner tools
Open Source Software
potential vulnerabilities
Protocols
pubcrawl
modular framework
resilience
Resiliency
Scalability
scanner module
scanning tools
security concepts
severe vulnerabilities
tools
intermediate scanning
analysis data
automated network reconnaissance
bad application
common IP-based IoT components
computer network security
Decision Making
Electronic mail
identified network vulnerabilities
advanced analysis modules
Internet of Things
Internet of Things devices
IoT devices
IP networks
IP-based networks
meaningful correlation
modular capabilities
biblio
Detect Me If You… Oh Wait. An Internet-Wide View of Self-Revealing Honeypots
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
Open Source Software
Security by Default
simple signature-based detection
self-revealing honeypots
mail server
Internet-wide view
hosting networks
government incentive
FTP mirror
default open-source honeypots
cloud network
Censys scan data
attack monitoring
computer network security
IoT device
digital signatures
Market research
tools
internet
Statistics
Sociology
pubcrawl
Resiliency
security
Servers
Scalability
biblio
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
Open Source Software
vulnerable code public
unpatched OSS versions
software vendors
security patches mapping
security patch database
security fixes
secretly patched vulnerabilities
secret security patches
n-day attacks
easy software development management
BoringSSL
armored attackers
0-day vulnerability
0-day attacks
security patch
security of data
Compositionality
software maintenance
software development management
public domain software
Computer bugs
machine learning
Training
Databases
vulnerability detection
Metrics
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
security
biblio
Identification of the Impacts of Code Changes on the Security of Software
Submitted by aekwall on Mon, 02/10/2020 - 12:09pm
electronic commerce
software assurance
software lifetime
software code
security state
security assurance cases
security assurance case
security assessment time
open-source ERP software application
open-source e-commerce software application
Open Source Software
monitored security functions
incremental development
enterprise resource planning
code change impact
assurance case elements
Monitoring
security requirements
Scalability
safety-critical software
Java
code review
source code (software)
software maintenance
Unified modeling language
public domain software
tools
software security
composability
pubcrawl
security
file
Support for Security and Safety of Programmable IoT Systems
Submitted by Atul Prakash on Fri, 01/10/2020 - 4:38pm. Contributors:
Atul Prakash
Darko Marinov
Software Testing
adversarial testing
permission models
Open Source Software
software/hardware testing
Posters
1646392
1646305
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Cross-Release Code Churn Impact on Effort-Aware Software Defect Prediction
Submitted by grigby1 on Thu, 09/26/2019 - 10:25am
open-source projects
standards
software quality
software metrics
software defect prediction
Safe Coding
Resiliency
resilience
regression analysis
public domain software
pubcrawl
Predictive models
Pop effort aware measure
policy-based governance
AUC
Open Source Software
Metrics
Measurement
Human Factors
Human behavior
GM
effort-aware software defect prediction
design metrics
cross-release code churn impact
Cross-release code churn
Correlation
complex systems
collaboration
biblio
Influencers of Quality Assurance in an Open Source Community
Submitted by grigby1 on Mon, 02/25/2019 - 3:17pm
pubcrawl
Scalability
composability
quality assurance
Open Source Software
OSS community
software assurance
biblio
Leveraging Historical Versions of Android Apps for Efficient and Precise Taint Analysis
Submitted by grigby1 on Thu, 02/14/2019 - 11:19am
invasive software
user apps
tools
taint checking
taint analysis
simultaneous scalability
security vulnerabilities
security
representative precise taint analysis
real-world evolving Android apps
reachability analysis
pubcrawl
Open Source Software
mobile computing
Metrics
analysis effectiveness
incremental taint analysis
incremental
historical versions
Google
EVOTAINT
Evolution
differencing
composability
Benchmark testing
attacks
Android ecosystem
Android devices
Android (operating system)
android
biblio
Constructing Supply Chains in Open Source Software
Submitted by grigby1 on Mon, 12/03/2018 - 1:51pm
Knowledge engineering
knowledge flow
Metrics
open source
Open Source Software
Production facilities
pubcrawl
resilience
Resiliency
risk management
Scalability
software supply chain
supply chain risk assessment
supply chains
tools
« first
‹ previous
1
2
3
4
5
6
next ›
last »