Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information Reuse
biblio
Foraging-Theoretic Tool Composition: An Empirical Study on Vulnerability Discovery
Submitted by grigby1 on Mon, 06/06/2022 - 12:11pm
empirical study
vulnerability discovery
tools
tool design patterns
Software
security
pubcrawl
profitability
Information Reuse
Information foraging theory
object oriented security
design science
Design methodology
data science
Costs
Compositionality
codes
Metrics
composability
Resiliency
biblio
Evaluation and Enhancement of the Actionability of Publicly Available Cyber Threat Information in Digital Forensics
Submitted by grigby1 on Mon, 06/06/2022 - 12:10pm
information forensics
Actionable Cyber Threat Information
Autopsy
Compositionality
Conferences
Digital Forensics
Electronic mail
Incident Investigation
Information Reuse
Object recognition
Phishing
pubcrawl
Resiliency
security
STIX
tools
biblio
High Efficient and Secure Chaos-Based Compressed Spectrum Sensing in Cognitive Radio IoT Network
Submitted by grigby1 on Mon, 06/06/2022 - 12:10pm
Internet of Things
security
pubcrawl
Resiliency
wireless sensor networks
sensors
chaotic communication
Compositionality
simulation
Sensitivity
cognitive radio
spectrum sensing
chaotic system
compressive sensing
Information Reuse
biblio
Software Reuse Exploits in Node.js Web Apps
Submitted by grigby1 on Mon, 06/06/2022 - 12:10pm
security
Servers
pubcrawl
Resiliency
Safety
Ecosystems
Manuals
data flow analysis
Compositionality
code injection attacks
code reuse attacks
Inspection
codes
application-level DoS
private data leaks
Information Reuse
biblio
Cyberattack Ontology: A Knowledge Representation for Cyber Supply Chain Security
Submitted by grigby1 on Mon, 06/06/2022 - 12:09pm
security
cyber security
pubcrawl
Resiliency
Computational modeling
Computer crime
Ontologies
Compositionality
Semantics
threat intelligence
supply chains
Vocabulary
cyber supply chain
Cyberattack Ontology
Knowledge representation
Information Reuse
biblio
Finding Runtime Usable Gadgets: On the Security of Return Address Authentication
Submitted by grigby1 on Mon, 06/06/2022 - 12:09pm
security
pubcrawl
Resiliency
message authentication
authentication
Runtime
Compositionality
memory security
codes
Return address authentication
reuse attack
Information Reuse
biblio
AddrArmor: An Address-based Runtime Code-reuse Attack Mitigation for Shared Objects at the Binary-level
Submitted by grigby1 on Mon, 06/06/2022 - 12:09pm
security
pubcrawl
Resiliency
Hardware
Instruments
Runtime
Compositionality
Performance analysis
Loading
codes
code-reuse attack
instrumentation
Information Reuse
biblio
PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities
Submitted by grigby1 on Mon, 06/06/2022 - 12:08pm
security
Monitoring
pubcrawl
Resiliency
Correlation
Libraries
Compositionality
software quality
Open Source Software
statistical analysis
code reuse
Library dependency
Software Vulnerability
Information Reuse
biblio
Mitigating Web Scrapers using Markup Randomization
Submitted by grigby1 on Fri, 02/25/2022 - 1:32pm
machine learning algorithms
Web scraping
Web crawler
Randomization
pubcrawl
policy-based governance
middleware security
middleware
markup HTML
Information Reuse
information and communication technology
Data mining
Crawlers
content security
composability
collaboration
Blogs
security
biblio
Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices
Submitted by grigby1 on Fri, 02/04/2022 - 2:48pm
IoT
Scalability
rop attacks
return-oriented programming
Return Oriented Programming (ROP)
return oriented programming
Resiliency
resilience
pubcrawl
Power demand
Information Reuse
Incremental Code Update
Human Factors
Generators
encryption
Computer crime
composability
codes
authentication
security
« first
‹ previous
1
2
3
next ›
last »