Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software Vulnerability
biblio
Existing Vulnerability Information in Security Requirements Elicitation
Submitted by grigby1 on Fri, 09/01/2023 - 1:50pm
security
pubcrawl
resilience
Resiliency
Conferences
composability
Compositionality
Software systems
software engineering
requirements engineering
Software Vulnerability
Information Reuse
security requirements elicitation
biblio
Automated Extraction of Software Names from Vulnerability Reports using LSTM and Expert System
Submitted by grigby1 on Thu, 07/20/2023 - 3:15pm
Software systems
Software Product Name Extraction
Common Vulnerability and Exposures
Common Product Enumeration
Resiliency
expert systems
Software Vulnerability
Publishing
natural language processing
security
delays
privacy
Scalability
Analytical models
Software
resilience
Human behavior
pubcrawl
biblio
Predicting severity of software vulnerability based on BERT-CNN
Submitted by grigby1 on Fri, 02/03/2023 - 2:42pm
Artificial Intelligence
vulnerability severity prediction
BERT
power grid vulnerability analysis
Personnel
Software Vulnerability
Text processing
Bit error rate
Task Analysis
CNN
composability
authentication
Software
Resiliency
resilience
Metrics
pubcrawl
biblio
PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities
Submitted by grigby1 on Mon, 06/06/2022 - 11:08am
security
Monitoring
pubcrawl
Resiliency
Correlation
Libraries
Compositionality
software quality
Open Source Software
statistical analysis
code reuse
Library dependency
Software Vulnerability
Information Reuse
biblio
Analysis of the Most Common Software and Hardware Vulnerabilities in Microprocessor Systems
Submitted by grigby1 on Thu, 03/04/2021 - 1:45pm
resilience
Metrics
microcomputers
microprocessor systems
Microsoft Windows (operating systems)
network access
Production
Program processors
pubcrawl
remote attack
local computer calculation network
Resiliency
Server Message Block service
Silicon
Software Vulnerability
Transistors
WannaCry trojan encoder
Windows Operating System Security
Windows OS
encryption program
security
authorisation
composability
Computer crime
computer viruses
Computers
Cryptography
Data protection
Windows operating system
File systems
Hardware
hardware algorithm protection
hardware vulnerabilities
hardware vulnerability
information protection
information security
invasive software
biblio
Research on Intelligent Evaluation Method of Transient Analysis Software Function Test
Submitted by aekwall on Mon, 11/02/2020 - 1:47pm
Software Vulnerability
security of data
Software
software function failure
software functional completeness
software functional integrity positioning
software metrics
software reliability
software reliability measurement
reliability intelligent evaluation
spectral density distribution method
statistical distributions
testing
Transient analysis
transient analysis software function testing
transient distributed
transient distributed cloud computing environment
intelligent evaluation method
active deep learning mathematical model
active depth learning algorithm
association rule mining method
Cloud Computing
cloud computing environment
correlation dimension characteristics
Data mining
Functional testing
active deep learning
learning (artificial intelligence)
Measurement
metrics testing
Metrics
program diagnostics
program testing
pubcrawl
biblio
Beware of the Vulnerability! How Vulnerable are GitHub's Most Popular PHP Applications?
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
PHP
CVSS
critical vulnerabilities
GitHub
injection vulnerabilities
open source
open source PHP applications
open source project owners
open source projects
software vulnerabilities
project popularity
RIPS
scanning
software project
Software Vulnerability
static analysis vulnerability scanner
vulnerable project
Cross Site Scripting
Computer bugs
data integrity
security
Resiliency
Human behavior
pubcrawl
tools
software engineering
static analysis
Scalability
statistical analysis
software security
vulnerability detection
Computers
cross-site scripting
XSS
Open Source Software
biblio
Inferring API Correct Usage Rules: A Tree-based Approach
Submitted by grigby1 on Fri, 08/14/2020 - 10:45am
inference mechanisms
application programming interface
statistically extracted API correct usage rules
Software Vulnerability
parent API
majority API usages
lower-level API
API tree structure
API misuse
API documentation
API Correct Usage Rule
security of data
Compositionality
tree data structures
application program interfaces
APIs
Linux
program debugging
Resiliency
resilience
pubcrawl
biblio
Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk
Submitted by aekwall on Mon, 07/06/2020 - 9:19am
pubcrawl
tactical risk
Software Vulnerability
software fault tolerance
Servers
security of data
security
Safety
risk management
risk analysis
resource management
Resiliency
resilience
random system faults
CPS resilience
optimal cyber defense remediation
operational technology
Operational Resilience
operational impact assessment
information technology
graph theory
fault graph-based model
Erbium
data-driven attack graph
Damage Assessment
cyber-physical systems
cyber threats
cyber physical systems
biblio
A Proposed Approach to Build an Automated Software Security Assessment Framework using Mined Patterns and Metrics
Submitted by aekwall on Mon, 03/02/2020 - 11:30am
security-specific properties
mined patterns
Patterns
pubcrawl
reliable software
Resiliency
Scalability
secure code
security
security of data
security-centric
Metrics
Software
software metrics
software security
software security level
Software Vulnerability
text analysis
tools
Ubiquitous Computing Security
Vulnerability prediction
Data mining
Security Metrics
automated framework
Automated Secure Software Engineering
automated software security assessment framework
building security-specific metrics
coding theory
Complexity theory
composability
current software metrics
Computing Theory
encoding
estimated security level
existing nanopatterns
generic patterns
graph theory
Human Factors
Java
Java method-level traceable patterns
machine learning
1
2
next ›
last »