Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
FraudFind: Financial fraud detection by analyzing human behavior
Submitted by aekwall on Mon, 10/12/2020 - 10:43am
auditing
Human Behavior and Cybersecurity
triangle of fraud
senior managers
semantic techniques
payroll employees
FraudFind
fraud triangle theory
financial fraud detection
financial audit model
Continuous Audit
bank fraud
Human Factors
human factor
security of data
Banking
financial data processing
behavioural sciences computing
fraud
Personnel
Data mining
Cybersecurity
tools
pubcrawl
Human behavior
Electronic mail
real-time systems
Organizations
biblio
Analysis of Adversarial Movement Through Characteristics of Graph Topological Ordering
Submitted by aekwall on Mon, 10/12/2020 - 10:43am
Heating systems
Human Behavior and Cybersecurity
topological sort networks
network theory
movement association
mixed methods
graph topological ordering
dynamic decision-making
adversarial team
adversarial movement complexity
adaptive human behavior
Human behavior
security of data
cyberattacks
integrated circuits
Sorting
network theory (graphs)
social network
Training
Decision Making
tools
graph theory
pubcrawl
Computer crime
biblio
Inferring Trust Using Personality Aspects Extracted from Texts
Submitted by aekwall on Mon, 10/12/2020 - 10:33am
inference mechanisms
Expert Systems and Privacy
trust mechanisms
trust inference
trust computation
personality models
online human-fed evaluation systems
nonpersonality-wise approaches
malicious people
logical protection
evaluation system
affective aspects
psychology
trust model
Numerical models
security of data
Software systems
Human Factors
Data mining
Correlation
text analysis
Decision Making
tools
Computational modeling
pubcrawl
Human behavior
Data models
Trusted Computing
data privacy
Scalability
biblio
CONVUL: An Effective Tool for Detecting Concurrency Vulnerabilities
Submitted by grigby1 on Tue, 10/06/2020 - 1:01pm
multi-threading
vulnerabilities
tools
Synchronization
security of data
security
Runtime
Resiliency
resilience
pubcrawl
program diagnostics
multithreaded execution nondeterminism
Clocks
Metrics
Instruments
Instruction sets
cyber physical systems
CPS
CONVUL
Concurrent computing
concurrency vulnerability detection
concurrency control
Concurrency
composability
biblio
SCMiner: Localizing System-Level Concurrency Faults from Large System Call Traces
Submitted by grigby1 on Tue, 10/06/2020 - 1:01pm
Resiliency
multiple processes
practical online bug diagnosis tool
principal component analysis
Production
production system
program debugging
program diagnostics
program testing
pubcrawl
resilience
multiple failing executions
scheduling
SCMiner
security
security of data
statistical analysis
statistical anomaly detection techniques
system call traces
System Level
system-level concurrency fault
tools
event handlers
Computer bugs
Concurrency
concurrency (computers)
Concurrency Failures
Concurrent computing
CPS
cyber physical systems
Data mining
debugging
default system audit tools
composability
failure-inducing system call sequences
fault diagnosis
fault localization
file content
Instruments
interleaving schedule
localizing system-level concurrency faults
Metrics
Multi Process Applications
biblio
Dependability Assessment of SOA-Based CPS With Contracts and Model-Based Fault Injection
Submitted by grigby1 on Mon, 10/05/2020 - 1:03pm
dependability
tools
Software Architecture
service-oriented architecture
service orientation (SOA)
service orientation
service behavior
pubcrawl
Model-based
Formal Specification
Fault injection
fault diagnosis
engineering complex distributed systems
Adaptation models
cyber-physical systems
cyber-physical
CPS model
contracts
Contract-based
contract specification help
constituent components
Computational modeling
Compositionality
automata
architectural designs
Analytical models
biblio
A Platform-Aware Model-Driven Embedded Software Engineering Process Based on Annotated Analysis Models
Submitted by grigby1 on Mon, 10/05/2020 - 1:02pm
Analytical models
Biological system modeling
Component-based Software Engineering
Compositionality
Computational modeling
embedded software
Measurement
Model-driven development
On-board Software
pubcrawl
schedulability analysis
tools
biblio
Security Assessment of Dynamic Networks with an Approach of Integrating Semantic Reasoning and Attack Graphs
Submitted by aekwall on Mon, 10/05/2020 - 10:53am
security assessment
Dynamic Networks and Security
test networks
semantic reasoning
Security Ontology
scalable security analysis
risk assessment experience
ontology- and graph-based approach
integrating semantic reasoning
Inference algorithms
security knowledge
attack graph
inference mechanisms
Semantics
cognition
security problems
security of data
ontologies (artificial intelligence)
cyber-attacks
risk management
Decision Making
tools
Metrics
Mobile handsets
graph theory
composability
pubcrawl
Resiliency
network security
security
Ontologies
enterprise networks
biblio
Automatic XSS Detection and Automatic Anti-Anti-Virus Payload Generation
Submitted by aekwall on Mon, 09/28/2020 - 11:35am
parameter characteristics
SVM algorithm
XSS vulnerability
automatic anti-anti-virus payload generation tool
automatic bypassing
automatic detection
automatic XSS detection tool
DQN algorithm
malicious XSS attacks
malicious XSS parameters
Web application
RNN LSTM algorithm
rule-based WAF
user input parameters
user interaction
Web 2.0 era
XSS attack
XSS attack codes
Cross Site Scripting
internet
Support vector machines
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Human behavior
pubcrawl
Reinforcement learning
Scalability
tools
cross-site scripting
Training
recurrent neural nets
automatic generation
computer viruses
Payloads
Browsers
biblio
Adaptive Random Testing for XSS Vulnerability
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
Browsers
Cross Site Scripting
XSS testing tool
Subspace constraints
open source vulnerable benchmarks
headless browser
fuzzing method
common vulnerabilities
black-box testing tools
ART method
adaptive random testing
XSS vulnerability
fuzzing
security of data
Payloads
web applications
public domain software
program testing
cross-site scripting
Web sites
tools
internet
pubcrawl
Human behavior
Resiliency
Scalability
« first
‹ previous
…
31
32
33
34
35
36
37
38
39
…
next ›
last »