Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
static analysis
biblio
Malware Classification Using Byte Sequence Information
Submitted by grigby1 on Thu, 01/02/2020 - 2:45pm
CNN
deep learning
expert systems
Human behavior
malware classification
pubcrawl
resilience
Resiliency
Scalability
security
static analysis
biblio
DScope: Detecting Real-World Data Corruption Hang Bugs in Cloud Server Systems
Submitted by grigby1 on Mon, 12/30/2019 - 2:21pm
composability
cyber physical systems
data corruption
False Data Detection
Human behavior
performance bug detection
pubcrawl
resilience
Resiliency
static analysis
biblio
Cross Site Scripting: Investigations in PHP Web Application
Submitted by aekwall on Mon, 12/16/2019 - 2:17pm
PHP Web application
XSS
World Wide Web
web security
Web application utilisation
tools
static analysis
Servers
security of data
Scalability
resilience
pubcrawl
-Software-Security
PHP technology
Licenses
internet
Human behavior
Cross-Site-Scripting
cross-site scripting
Cross Site Scripting
Browsers
-XSS
-Web-Application-Security
-Vulnerability
biblio
Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
smart grid devices
power system
power system security
predefined vulnerability patterns
program diagnostics
resilience
Safety
security of data
security threats
power grid vulnerability analysis
Smart Grids
smart meters
smart power grids
smart terminals
Syntactics
terminal devices
terminal security
vulnerability detection
Compositionality
pubcrawl
Human behavior
composability
Resiliency
Analytical models
automatic static analysis
buffer-overflow vulnerabilities
buffer-overflow vulnerability detection
static analysis
Computer bugs
device program information
error reporting
feature extraction
Metrics
modern power transmission network
power engineering computing
biblio
Checked C: Making C Safe by Extension
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
incremental conversion
tools
storage management
static analysis
spatial safety
security
Safety
Safe Coding
Resiliency
resilience
pubcrawl
programming languages
program debugging
policy-based governance
performance evaluation
Metrics
backward-compatibility
Human Factors
Human behavior
highly performant code
developer control
Cyclones
Computer bugs
collaboration
checked region
checked pointer
checked C's design
C++ language
C safe
bounds-safe interfaces
Benchmark testing
biblio
Safe Automated Refactoring for Intelligent Parallelization of Java 8 Streams
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
semantics-preserving fashion
policy-based governance
pubcrawl
Refactoring
resilience
Resiliency
running operations
safe automated refactoring
Safe Coding
Semantics
Pipelines
sequential streams
software maintenance
static analysis
Stream API
stream code
stream operations
streams
typestate analysis
Writing
Instruction sets
automated refactoring approach
automatic parallelization
collaboration
data structures
finite data structures
Human behavior
Human Factors
Image color analysis
infinite data structures
application program interfaces
intelligent parallelization
Java
Java 8
lambda expression side-effects
mainstream object-oriented programming languages
MapReduce-style operations
Metrics
optimizing stream code
parallel streams
biblio
A Position Study to Investigate Technical Debt Associated with Security Weaknesses
Submitted by aekwall on Mon, 08/26/2019 - 10:06am
common weakness scoring system
security of data
security
Software
Software measurement
Human behavior
pubcrawl
policy-based governance
Metrics
tools
Companies
static analysis
software development management
catching vulnerabilities
Common Weakness Enumeration
resilience
CWSS scores
decidedly negative impacts
design level CWE
exploitable weaknesses
five-step approach
potential security breaches
quality assurance
Quamoco quality model
scoring mechanism
security weaknesses
software lifecycle
software quality
TD
technical debt
biblio
Static and Dynamic Malware Analysis Using Machine Learning
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
Internet oriented machines security
summary information
static malware analysis
static analysis
sandboxing
Resiliency
registry keys changed
pubcrawl
PEFILE
obfuscate
Metrics
malwares
malware
machine learning
learning (artificial intelligence)
invasive software
Malware Analysis
Human behavior
feature extraction
evade
Dynamic Malware Analysis
dynamic analysis
DLLs
Data mining
cuckoo sandbox
Classification algorithms
Binary
application program interfaces
APIs
privacy
Predictive Metrics
biblio
A Malware Analysis and Artifact Capture Tool
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
microsoft windows
Windows
tools
Syntactics
static states
static analysis
source code (software)
sandbox
Resiliency
pubcrawl
process flow
obfuscation techniques
obfuscation
multiple code paths
Monitoring
artifact capture tool
Metrics
malware behavior
malware artifacts
Malware Analysis
malware
invasive software
interactive malware analysis
Human behavior
handwriting recognition
dynamic states
dynamic control
Disassemblers
Decompilers
debuggers
biblio
One-Shot Learning Approach for Unknown Malware Classification
Submitted by grigby1 on Mon, 06/10/2019 - 2:02pm
neural nets
Word2Vec
unknown malware classification
Training
Task Analysis
static analysis
Resiliency
resilience
pubcrawl
privacy
pattern classification
one-shot learning network
one-shot learning approach
One-shot learning
Neural Turing Machine
Neural networks
Adaptation models
network systems
natural language processing
Metrics
memory augmented neural network
malware classification
malware behavior
malware API calls sequence
malware
Least Recently Used Access
learning (artificial intelligence)
invasive software
intelligent protection systems
Human behavior
fewshot learning
API Sequence
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »