Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning Types
Submitted by aekwall on Mon, 03/15/2021 - 11:09am
Grounded Theory study
secure software
security tools
14 professional software developers
50 professional software developers
code security
developer preferences
developer security warnings
development tools
compiler security
Qualitative research
security checkers
security warning types
security warnings
static analysis engines
warning interactions
warning type
security of data
Compositionality
security issues
program diagnostics
software development
static analysis
software engineering
machine learning
tools
Metrics
pubcrawl
Resiliency
Software
security
Organizations
Scalability
biblio
Gap between Theory and Practice: An Empirical Study of Security Patches in Solidity
Submitted by aekwall on Mon, 03/15/2021 - 11:07am
contracts
vulnerability patches
Solidity team
Solidity
security patches
real-world Solidity contracts
real-world Ethereum smart contracts
potentially vulnerable contracts
missing security patches
Ethereum smart contract developers
empirical study
smart contract security
Manuals
electronic commerce
compiler security
C++ language
security of data
program compilers
Compositionality
encoding
program diagnostics
smart contracts
security vulnerabilities
static analysis
software engineering
tools
Metrics
pubcrawl
Resiliency
security
telecommunication security
Scalability
biblio
ComPy-Learn: A toolbox for exploring machine learning representations for compilers
Submitted by aekwall on Mon, 03/15/2021 - 11:07am
compilers
program compilers
Clang
LLVM
compiler security
empirical evaluation
Clang compiler
Code Representations
compiler heuristics
Compositionality
ComPy-Learn
developer productivity
graph representations
LLVM compiler backend
program code
software engineering tools
software performance
syntax-level language information
tools
Task Analysis
Program processors
learning (artificial intelligence)
Resiliency
pubcrawl
machine learning
Metrics
optimization
Scalability
Training
software engineering
public domain software
Vulnerability prediction
program diagnostics
Predictive models
Pipelines
biblio
The Making of Indicator of Compromise using Malware Reverse Engineering Techniques
Submitted by grigby1 on Tue, 03/09/2021 - 2:05pm
Metrics
tools
static analysis
Software
security
Scalability
reverse engineering
resilience
pubcrawl
Packed Malware
Malware Analysis
Malware Threat
malware
indicators of compromise
computer architecture
BIOS
Resiliency
Human behavior
Predictive Metrics
privacy
biblio
Abnormal transaction detection of Bitcoin network based on feature fusion
Submitted by grigby1 on Tue, 03/09/2021 - 1:49pm
Anomaly Detection
bitcoin
blockchain
data analysis
feature extraction
Feature fusion
History
Human behavior
network analysis
pubcrawl
Scalability
security
tools
biblio
Implementation and Analysis of USB based Password Stealer using PowerShell in Google Chrome and Mozilla Firefox
Submitted by grigby1 on Tue, 03/09/2021 - 1:39pm
Software
password management feature
passwordfox
PasswordFox program
policy-based governance
powershell
powershell script
pubcrawl
rubber ducky
password
stored data
time 14.0 s
tools
Universal Serial Bus
USB password stealer
user interfaces
usernames
Windows operating system
Google Chrome
Arduino Pro Micro Leonardo device
authorisation
badusb
browser applications
Browsers
brute force attacks
chromepass
Computer crime
arduino pro micro leonardo
Hardware
Human behavior
Human Factors
internet
Mozilla Firefox login data
operating systems
operating systems (computers)
biblio
IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 1:25pm
Resiliency
machine learning
machine learning algorithms
malware
malware attack
Metrics
network traffic
packet traffic
pubcrawl
resilience
learning (artificial intelligence)
scikit-learn
Scikit-learn analysis tools machine learning
Scikit-learn machine learning
telecommunication traffic
Time measurement
tools
WEKA
weka tool
false positive rate
botmaster
botnet
botnet IoT
botnet malware attacks
botnets
classification
composability
computer network security
Decision trees
accurate classification methods
inconspicuousness characteristics
inexpensive power
internet network security
Internet of Things
Internet of Things network infrastructure
invasive software
IoT botnet malware classification
IoT devices
biblio
Analysis of Fileless Malware and its Evasive Behavior
Submitted by grigby1 on Thu, 03/04/2021 - 1:45pm
static and advanced malware analysis
malware threats
Memory Analysis
Metrics
operating systems
Payloads
PowerShell (PS)
pubcrawl
resilience
security
malware
Task Analysis
tools
Trojan horses
white box
White Box Security
Windows Management Instrumentation (WMI)
Windows operating system
Windows Operating System Security
computer viruses
privacy
Predictive Metrics
Human behavior
Resiliency
Advance Volatile Threat
Advance Volatile Threat (AVT)
composability
computer systems
Malware Analysis
different malware
evasion
executable malware
file-based malware
fileless malware
Instruments
internet
invasive software
biblio
Can We Predict the Quality of Spectrum-based Fault Localization?
Submitted by aekwall on Mon, 03/01/2021 - 3:47pm
fault diagnosis
work factor metrics
static test suite
static test metrics
spectrum-based fault localization
prediction model
potential effectiveness
fault-related metrics
fault localization techniques
fault localization effectiveness
effective fault localization
dynamic test suite
dynamic test metrics
debugging
automated fault localization
Scalability
Couplings
software fault tolerance
software metrics
program debugging
Predictive models
Complexity theory
Measurement
machine learning
program testing
tools
Metrics
pubcrawl
Resiliency
Electronic mail
biblio
Self-organization of Network Communities via Blockchain Technology: Reputation Systems and Limits of Digital Democracy
Submitted by grigby1 on Tue, 02/23/2021 - 1:23pm
reputation systems
network members reputation
Oracle
organisational aspects
political institutionalization
politics
pubcrawl
public accountability
reputation assessment system
reputation system
network communities reputation
resilience
Resiliency
security of data
self-organization
social networking (online)
tools
traditional reputation systems
virtual network communities
Economics
blockchain technology
blockchain-based reputation system
blockchain-oracles
civil society
composability
data privacy
digital democracy
digital technologies
blockchain
Games
Government
government control
government data processing
internet
Metrics
multi-agent systems
network accountability
« first
‹ previous
…
25
26
27
28
29
30
31
32
33
…
next ›
last »