Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
static analysis
biblio
Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements
Submitted by aekwall on Mon, 11/09/2020 - 1:20pm
OpenEMR
digital versions
EHR applications
Electronic Health Record applications
Health Information Technology certification criteria
Health Insurance Portability
HIPAA Compliance
HIPAA technical requirements
ONC certification
ONC criteria
open source EHR applications
convenient access
paper-based patient
patient medication
patient treatment plans
precise medical decision-making process
privacy criteria
Privacy Requirements
regulatory requirements
security risks
static code analysis-based vulnerability
Information Reuse and Security
static analysis
Servers
data privacy
electronic health records
Medical services
security
Resiliency
pubcrawl
privacy
tools
open source tools
security of data
security vulnerabilities
health care
security issues
Compositionality
certification
adopted EHR application
certification compliance
clinic visits
compliance checking
biblio
Malware Classification System Based on Machine Learning
Submitted by grigby1 on Thu, 10/29/2020 - 11:11am
malware
static analysis
Resiliency
resilience
pubcrawl
privacy
pattern classification
multifeature selection fusion
Metrics
malware classification system
malware classification
Classification system
machine learning
Libraries
learning (artificial intelligence)
invasive software
Human behavior
high-efficiency automatic classification system
Feature Selection
feature extraction
Entropy
biblio
A study to Understand Malware Behavior through Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:11pm
Zero-day attacks
signature based detection
obfuscated malware
mutated malware
Malware Signature
Malware Packer
malware features
behavioral based malware signature
Histograms
Predictive Metrics
computer science
malware behavior
malware
Malware Analysis
static analysis
privacy
tools
Metrics
pubcrawl
Human behavior
Resiliency
feature extraction
invasive software
malware detection
biblio
PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use
Submitted by aekwall on Mon, 10/26/2020 - 11:46am
formal verification
Linux Operating System Security
term rewriting
ROSA model checker
privileged open source programs
privilege escalation attacks
PrivAnalyzer
LLVM-based C/C++ compiler
Linux privileges
Linux privilege use
ChronoPriv
AutoPriv
operating systems
dynamic analysis
verification
static analysis
security
program compilers
Predictive Metrics
program diagnostics
Containers
Analytical models
tools
Metrics
composability
pubcrawl
Resiliency
Linux
Program processors
Access Control
security of data
biblio
Beware of the Vulnerability! How Vulnerable are GitHub's Most Popular PHP Applications?
Submitted by aekwall on Mon, 09/28/2020 - 12:34pm
PHP
CVSS
critical vulnerabilities
GitHub
injection vulnerabilities
open source
open source PHP applications
open source project owners
open source projects
software vulnerabilities
project popularity
RIPS
scanning
software project
Software Vulnerability
static analysis vulnerability scanner
vulnerable project
Cross Site Scripting
Computer bugs
data integrity
security
Resiliency
Human behavior
pubcrawl
tools
software engineering
static analysis
Scalability
statistical analysis
software security
vulnerability detection
Computers
cross-site scripting
XSS
Open Source Software
biblio
Multiple Layered Security Analyses Method for Cryptocurrency Exchange Servicers
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
malicious attacks
telecommunication security
static analysis
smartphone apps
smart phones
Semantics
semantic analysis
security
Resiliency
pubcrawl
multiple layered security analyses method
Androids
internet
Humanoid robots
dynamic analysis
cryptocurrency exchangers
cryptocurrency exchange servicers
cryptocurrency
cryptocurrencies
Cross Layer Security
composability
business trading
biblio
IMSpec: An Extensible Approach to Exploring the Incorrect Usage of APIs
Submitted by grigby1 on Fri, 08/14/2020 - 11:45am
Domain-Specific Language
application programming interface
lightweight domain-specific language
large-scale C programs
IMSpec rules
API-misuse detection capability
API usage validation
API usage constraints
API misuses
bug detection
API-misuse bugs
application programming interfaces
Syntactics
Semantics
Compositionality
tools
specification languages
public domain software
Computer bugs
application program interfaces
APIs
program diagnostics
program debugging
static analysis
Software
Resiliency
resilience
pubcrawl
Engines
biblio
An Empirical Study on API-Misuse Bugs in Open-Source C Programs
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
C language
API misuse
API-misuse bugs
API-misuse detection
API-misuse detectors
APIMU4C
benchmark
bug detection
C code
application programming interfaces
empirical study
fix patterns
Open Source Software
open-source C programs
static analysis detectors
usage statistics
application programming interface
security of data
Detectors
Compositionality
public domain software
security vulnerabilities
Computer bugs
application program interfaces
APIs
program diagnostics
program debugging
static analysis
Libraries
Benchmark testing
Resiliency
resilience
pubcrawl
biblio
Real Time Android Ransomware Detection by Analyzed Android Applications
Submitted by aekwall on Mon, 08/10/2020 - 10:32am
program diagnostics
android encryption
static method
realtime variant ransomware detection
realtime unknown ransomware detection
realtime new ransomware detection
real-time detection
real-time Android ransomware detection
PC environment
New/Variant/Unknown Ransomware
dynamic method
analyzed Android applications
Metrics
Android (operating system)
android
Monitoring
static analysis
Entropy
smart phones
Ransomware
pubcrawl
Human behavior
Resiliency
real-time systems
mobile computing
invasive software
encryption
Cryptography
Scalability
biblio
File Similarity Determination Based on Function Call Graph
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
Plagiarism
static analysis methods
space-time efficiency
similarity detection method
similarity detection
large-scale software systems
graph isomorphism
function features
function call graph
file similarity determination
decision strategies
control flow features
ip protection
file organisation
information retrieval
feature extraction
intellectual property
graph theory
Syntactics
Measurement
Metrics
program diagnostics
static analysis
composability
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »