Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
static analysis
biblio
SootKeeper: Runtime Reusability for Modular Static Analysis
Submitted by grigby1 on Thu, 06/07/2018 - 3:11pm
Modularity
static analysis
pubcrawl
Human behavior
composability
resilience
Resiliency
static code analysis
biblio
Renraku: The One Static Analysis Model to Rule Them All
Submitted by grigby1 on Thu, 06/07/2018 - 3:11pm
static analysis
pubcrawl
Human behavior
composability
resilience
software design
Resiliency
static code analysis
code quality
biblio
Detecting Security Vulnerabilities in Object-Oriented PHP Programs
Submitted by grigby1 on Thu, 06/07/2018 - 3:02pm
PHP
tools
static analysis
security vulnerability detection
security analysis tool
security
safety-critical software
Resiliency
resilience
pubcrawl
program diagnostics
program debugging
PIXY PHP security analyzer
analysis
OOPIXY
object-oriented programming
object-oriented PHP programs
object oriented security
object orientation feature
microbenchmarks
Metrics
feature extraction
dynamic languages
computer architecture
composability
Benchmark testing
biblio
Automated Vulnerability Analysis Technique for Smart Grid Infrastructure
Submitted by grigby1 on Thu, 05/24/2018 - 12:30pm
smart grid infrastructure
Power system protection
pubcrawl
resilience
Resiliency
security
security of data
security vulnerability analysis
Smart Grid
power grid vulnerability analysis
Smart Grids
smart meters
smart power grids
static analysis
Vulnerability Analysis
vulnerability analysis methodologies
vulnerability discovery method
automated power electricity network
power grid system
power engineering computing
power electricity infrastructure
Metrics
Korean smart grid environment
general systems
embedded software vulnerability discovery
embedded software
cyber-physical system security
cyber-physical system
Computer bugs
computer architecture
Compositionality
composability
automated vulnerability analysis
biblio
Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures
Submitted by grigby1 on Thu, 05/24/2018 - 12:24pm
assume-guarantee specifications
first-order linear temporal logic
Human behavior
Policy
privacy
Privacy Policies
Privacy Policy
pubcrawl
safety and liveness properties
Scalability
static analysis
biblio
How to Build Static Checking Systems Using Orders of Magnitude Less Code
Submitted by el_wehby on Thu, 05/17/2018 - 6:29pm
bug finding
micro-grammars
parsing
static analysis
1505684
biblio
Identifying Email Threats Using Predictive Analysis
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
Policy
URL
unsolicited e-mail
unseen emails
Uniform resource locators
targeted attacks
Support vector machines
static analysis
sandboxing
Random Forest
pubcrawl
Predictive models
predictive analysis approach
Policy-Governed systems
Policy-Governed Secure Collaboration
Analytical models
malware attachment
malware
malicious emails
machine learning model
machine learning algorithms
learning (artificial intelligence)
invasive software
feature extraction
email threat identification
Electronic mail
Computer crime
composability
collaboration
attackers
biblio
RansHunt: A Support Vector Machines Based Ransomware Analysis Framework with Integrated Feature Set
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
ransomware families
malwares
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
RansHunt
Ransomware
ransomware analysis framework
malware
ransomware samples
ransomware variants
sandboxing
static analysis
static code features
static features
Support vector machines
Algorithm design and analysis
machine learning
learning (artificial intelligence)
invasive software
integrated feature set
individual analysis approach
hybrid cryptosystem
Heuristic algorithms
feature extraction
Electronic mail
dynamic analysis
cyber-crime
Cryptography
crypto-ransomwares
composability
collaboration
biblio
JoanAudit: A Tool for Auditing Common Injection Vulnerabilities
Submitted by K_Hooper on Wed, 05/09/2018 - 10:55am
automated code fixing
Human behavior
pubcrawl
Resiliency
Scalability
security auditing
Security Audits
static analysis
Vulnerability
biblio
Path Cost Analysis for Side Channel Detection
Submitted by K_Hooper on Wed, 05/02/2018 - 10:45am
edge detection
security
composability
computer security
Metrics
pubcrawl
side-channel analysis
static analysis
taint analysis
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
next ›
last »