Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Scalable Quality and Testing Lab (SQTL): Mission-Critical Applications Testing
Submitted by aekwall on Mon, 11/02/2020 - 1:46pm
nonintegrated testing tools
Web Application Testing
tools
SQTL
Software Testing
software quality
Software
selenium
security testing
scalable quality-testing lab
quality engineers
QE
pubcrawl
program testing
performance testing
Measurement
mission-critical application
Metrics
Measurement and Metrics Texting
Manual Testing
interactive dashboard
decentralized testing tools
Data Driven Testing
Continuous Integration Testing
competitive intelligence
business intelligence tools
Banking
Automation Testing
automation
metrics testing
biblio
PREEMPT: PReempting Malware by Examining Embedded Processor Traces
Submitted by grigby1 on Fri, 10/30/2020 - 11:19am
learning (artificial intelligence)
zero overhead
tools
software-based AVS
security
Scalability
real-time systems
pubcrawl
program debugging
processor traces
PREEMPT malware
post-silicon validation
malware detection
malware
machine learning-based classifiers
low-latency technique
anti-virus software tools
invasive software
i-o systems security
I-O Systems
HPC
hardware-level observations
Hardware performance counters
Hardware
ETB
embedded trace buffer
embedded systems
embedded processor traces
debug hardware component
Databases
computer viruses
biblio
Malware Classification Using Machine Learning Algorithms and Tools
Submitted by grigby1 on Thu, 10/29/2020 - 10:10am
malware
tools
Support vector machines
Resiliency
resilience
Random Forest
pubcrawl
privacy
pattern classification
Metrics
matrix algebra
malware samples
malware classification
Classification algorithms
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Human behavior
feature extraction
family classification
emerging malwares
confusion matrix
comparative classification
comparable features
Cohen's Kappa
biblio
Evolutionary Computation for Improving Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:13am
program debugging
variable-strength covering arrays
software improvement
malicious code
individual software artifacts
GI-based bug repair
GI-based approach
genetic improvement
automated repair
automated malware analysis
benign software
Genetics
evolutionary computation
malicious software
Predictive Metrics
Servers
malware samples
Malware Analysis
genetic algorithms
software maintenance
privacy
tools
Metrics
pubcrawl
Human behavior
Resiliency
invasive software
security
malware
biblio
Behavioral malware analysis algorithm comparison
Submitted by aekwall on Mon, 10/26/2020 - 11:12am
tools
behavioral malware analysis
Sensitivity
Predictive Metrics
behavioral analysis
computer viruses
Malware Analysis
privacy
testing
computer security
Prediction algorithms
malware
Metrics
Algorithms
pubcrawl
Human behavior
Resiliency
machine learning
learning (artificial intelligence)
machine learning algorithms
malware detection
biblio
A study to Understand Malware Behavior through Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:11am
Zero-day attacks
signature based detection
obfuscated malware
mutated malware
Malware Signature
Malware Packer
malware features
behavioral based malware signature
Histograms
Predictive Metrics
computer science
malware behavior
malware
Malware Analysis
static analysis
privacy
tools
Metrics
pubcrawl
Human behavior
Resiliency
feature extraction
invasive software
malware detection
biblio
PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use
Submitted by aekwall on Mon, 10/26/2020 - 10:46am
formal verification
Linux Operating System Security
term rewriting
ROSA model checker
privileged open source programs
privilege escalation attacks
PrivAnalyzer
LLVM-based C/C++ compiler
Linux privileges
Linux privilege use
ChronoPriv
AutoPriv
operating systems
dynamic analysis
verification
static analysis
security
program compilers
Predictive Metrics
program diagnostics
Containers
Analytical models
tools
Metrics
composability
pubcrawl
Resiliency
Linux
Program processors
Access Control
security of data
biblio
Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System
Submitted by aekwall on Mon, 10/26/2020 - 10:45am
Drone
Weapons
software vulnerabilities
Linux operating system
2.0
AR
AR Drone 2.0
Busybox
CVE
autonomous aerial vehicles
embedded
embedded Linux system
open WiFi network
pairing mode
Parrot
SSH Tunnel
Linux Operating System Security
Metrics
computer network security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
security
tools
vulnerabilities
Vulnerability Analysis
public domain software
wireless LAN
Streaming media
Predictive Metrics
biblio
Securing connection between IT and OT: the Fog Intrusion Detection System prospective
Submitted by grigby1 on Fri, 10/16/2020 - 10:32am
proprietary protocols
Internet of Things
Intrusion Detection
intrusion detection system
legacy systems
Monitoring
New Implementation Approaches
operational technology network
production engineering computing
information technology network
Protocols
pubcrawl
resilience
Resiliency
SCADA systems
Scalability
security of data
tools
fog intrusion detection system
Anomaly Detection
common signature based intrusion detection system
cyberattack
Cybersecurity
deep packet inspection
digital signatures
distributed processing
Fog computing
anomaly based features
ICs
industrial control
industrial control system
Industrial Control Systems
Industrial Informatics
Industrial Internet of Things
industrial IoT devices
biblio
Security Analysis of the Electronic Voting Protocol Based on Blind Intermediaries Using the SPIN Verifier
Submitted by grigby1 on Fri, 10/16/2020 - 10:23am
LTL
verification
tools
SPIN verifier
SPIN formal verifier
SPIN
Security analysis
Resiliency
resilience
pubcrawl
Protocol Security
Promela language
policy-based governance
model checking
MITM
man in the middle attack
authentication
Linear Temporal Logic
government data processing
formal verification
Electronic voting systems
electronic voting system
electronic voting protocol
electronic voting
e-voting
E-Government
data substitution
Cybersecurity
Cryptographic Protocols
cryptographic protocol
collaboration
« first
‹ previous
…
30
31
32
33
34
35
36
37
38
…
next ›
last »