Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
dynamic analysis
biblio
Static analysis for web service security - Tools amp; techniques for a secure development life cycle
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
Web Application Security
SOA
SOAP
software bugs
Software verification
Source code analysis
Static Analysis Tool
static code analysis
strategic components
ubiquitous IoT
vulnerabilities detection
vulnerability identification
Simple object access protocol
web applications
Web service security
web services
Web services guidelines
Web Services Security
WS-SecureConversation
WS-security
XML
XML encryption
XML signature
program verification
critical national infrastructure
Cryptography
dynamic analysis
enterprise software ecosystem
Heartbleed
information exchange
mission critical API
Mobile Applications
Open Web Application Security Project
Penetration Testing
program diagnostics
Computer crime
public deployments
public sector infrastrucure development life cycle
Secure Software Development
security challenges
Security Code Review
service development paradigm
service oriented architecture
service-oriented architecture
services security
Shellshock
biblio
Spam Trapping System: Novel security framework to fight against spam botnets
Submitted by BrandonB on Wed, 05/06/2015 - 10:18am
prevent-then-detect approach
warfare kill zone
Unsolicited electronic mail
unsolicited e-mail
STS
static an analysis
spam trapping system
spam botnets
spam botnet detection
security framework
sandboxing principle
program diagnostics
airport check-in system
malware bot
malware
invasive software
intrusion detection system
dynamic analysis
defense-in-depth model
Cryptography
computational cost
Charge carrier processes
Airports
biblio
Modeling impact of attacks, recovery, and attackability conditions for situational awareness
Submitted by BrandonB on Tue, 05/05/2015 - 12:37pm
Intrusion Detection
topological attackability condition
timing relationships
time Petri nets
situational awareness
sensors
security of data
scanners
Petri nets
numerical evaluation
modeling impact
linear time-invariant system
Linear systems
actuators
Fires
dynamic analysis
distributed processing
distributed cyber control system
distributed control system
Decentralized Control
controllers
Control Theory
assets influence
anomaly-based intrusion detection system
Analytical models
biblio
Malicious data classification using structural information and behavioral specifications in executables
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
Software
malwares
NtTrace
obfuscation technology
pattern classification
program diagnostics
security devices
signature database
signature-based detection system
malware detection system efficiency improvement
static analysis
structural information
Syntactics
system calls
threat detection
threat mitigation
underground Internet economy
zero-day malware detection
internet
antivirus
automated malicious programs
behavioral specifications
Classification algorithms
dynamic analysis
executable file
feature extraction
Information systems
Algorithm design and analysis
invasive software
malicious behavior extraction
malicious data classification
malicious software detection
malicious software mitigation
malware
malware detection
malware detection system effectiveness improvement
biblio
DAIDS: An Architecture for Modular Mobile IDS
Submitted by BrandonB on Thu, 04/30/2015 - 1:26pm
intrusion detection system
third party mobile applications
telecom operator
security of data
profile applications
North America
Monitoring
modular mobile IDS
mobile radio
mobile devices
mobile computing
malware
malicious behavior
Android (operating system)
Intrusion Detection
Humanoid robots
dynamic analysis
Detectors
detection algorithms
Databases
DAIDS
behavior profiling
behavior analysis
Anomaly Detection
Androids
Android platform
biblio
Modeling impact of attacks, recovery, and attackability conditions for situational awareness
Submitted by BrandonB on Thu, 04/30/2015 - 12:05pm
Intrusion Detection
topological attackability condition
timing relationships
time Petri nets
situational awareness
sensors
security of data
scanners
Petri nets
numerical evaluation
modeling impact
linear time-invariant system
Linear systems
actuators
Fires
dynamic analysis
distributed processing
distributed cyber control system
distributed control system
Decentralized Control
controllers
Control Theory
assets influence
anomaly-based intrusion detection system
Analytical models
biblio
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
Submitted by rvmeush on Fri, 09/26/2014 - 1:04pm
Computerized monitoring
dynamic analysis
Filters
Heuristic algorithms
Information analysis
information security
Performance analysis
privacy
Reactive power
Runtime
Symbolic Execution
taint analysis
testing
biblio
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
malicious code
Training
security precaution
Safety
prudent science
prudent practice
malware experiment design
malware dataset
malware
Communities
invasive software
internet
Guidelines
experiments
dynamic analysis
detection model
datasets
file
Concurrency-Focused Dynamic Analysis
Submitted by TimTh on Tue, 05/28/2013 - 9:41am. Contributor:
Timothy Halloran
Presented as part of the
2013 HCSS conference
.
ABSTRACT:
Concurrency and Timing
Foundations
dynamic analysis
hardware-software boundary
Java programming language
memory model
mobile computing
SureLogic
Industry
Presentation
HCSS'13
HW/SW (HCSS'13)
« first
‹ previous
1
2
3
4
5
6
7