Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Weak-Assert: A Weakness-Oriented Assertion Recommendation Toolkit for Program Analysis
Submitted by aekwall on Mon, 08/26/2019 - 9:07am
program weakness
tools
testing
Syntactics
Software
security weaknesses
security
resilience
pubcrawl
assertion recommendation
program testing
policy-based governance
pattern matching
Metrics
Human behavior
Hardware
formal program verifcation
biblio
A Position Study to Investigate Technical Debt Associated with Security Weaknesses
Submitted by aekwall on Mon, 08/26/2019 - 9:06am
common weakness scoring system
security of data
security
Software
Software measurement
Human behavior
pubcrawl
policy-based governance
Metrics
tools
Companies
static analysis
software development management
catching vulnerabilities
Common Weakness Enumeration
resilience
CWSS scores
decidedly negative impacts
design level CWE
exploitable weaknesses
five-step approach
potential security breaches
quality assurance
Quamoco quality model
scoring mechanism
security weaknesses
software lifecycle
software quality
TD
technical debt
biblio
Information Assurance in modern ATE
Submitted by aekwall on Mon, 08/05/2019 - 9:40am
Instruments
tools
Task Analysis
software footprint
security of data
security
Resiliency
pubcrawl
policy-based governance
operating systems (computers)
operating system
microsoft windows
Metrics
internet
anti-virus
Information Assurance
Human behavior
electronic devices
cyber security
Computers
computer viruses
computer
composability
automatic test equipment
ATE system software
ATE OS settings
ATE
biblio
On the Feasibility of Generating Deception Environments for Industrial Control Systems
Submitted by aekwall on Mon, 07/01/2019 - 9:10am
SCADA
industrial control
Industrial Control Systems
integrated circuits
networked computer systems
operational ICS
proactive threat intelligence
pubcrawl
Resiliency
ICS networks
SCADA systems
SCADA Systems Security
security of data
supervisory control-and-data acquisition systems
threat intelligence
tools
Virtualization
composability
ICs
Human behavior
generating deception environments
deception
data acquisition systems
data acquisition
cyber threat landscape
cyber security
cyber defense
cyber defenders
critical physical processes
critical infrastructures
critical infrastructure environments
constantly morphing surface
computer network security
biblio
Wireless Security Audit Penetration Test Using Raspberry Pi
Submitted by grigby1 on Mon, 07/01/2019 - 9:03am
Scalability
wireless technology
wireless security audit
Wireless Protected Access
wireless networks
wireless LAN
Wireless fidelity
Wired Equivalent Privacy
WiFi testing tools
WiFi network
WiFi Auditor
WiFi attacks
tools
telecommunication security
Security Audits
auditing
Resiliency
resilience
Raspberry Pi 3 module
pubcrawl
Penetration Testing
penetration tester
man in the middle
Jamming
Human Factors
Human behavior
deliberate jamming
Communication system security
authorized wireless communications
authorisation
biblio
KLRA: A Kernel Level Resource Auditing Tool For IoT Operating System Security
Submitted by grigby1 on Mon, 07/01/2019 - 9:03am
operating system kernels
tools
Task Analysis
self-adaptive heuristic security mechanism
security of data
security issues
Security Audits
security
Scalability
resource-sensitive events
resource auditor
Resiliency
resilience
pubcrawl
Operating systems security
KLRA
kernel level resource auditing tool
kernel level
Kernel
IoT operating system security
iot operating system
IoT device
Internet of Things
Human Factors
Human behavior
Hardware
data privacy
biblio
Establishing Independent Audit Mechanisms for Database Management Systems
Submitted by grigby1 on Mon, 07/01/2019 - 9:02am
Scalability
logging
malicious hacking
meta data
metadata
Organizations
pubcrawl
Random access memory
resilience
Resiliency
independent audit mechanisms
security
security audit
security audit tools
Security Audits
security breaches
security threat
storage image
tamper-detection software
tools
Digital Forensics
auditing
comprehensive audit framework
Computer crime
computer crimes
database forensic analysis
database forensics
database forensics methods
database management systems
Databases
apriori database preparation
evidence gathering
file system metadata
forensic audit tools
Forensics
Human behavior
Human Factors
Image reconstruction
independent audit framework
biblio
A Malware Analysis and Artifact Capture Tool
Submitted by aekwall on Mon, 06/24/2019 - 1:41pm
microsoft windows
Windows
tools
Syntactics
static states
static analysis
source code (software)
sandbox
Resiliency
pubcrawl
process flow
obfuscation techniques
obfuscation
multiple code paths
Monitoring
artifact capture tool
Metrics
malware behavior
malware artifacts
Malware Analysis
malware
invasive software
interactive malware analysis
Human behavior
handwriting recognition
dynamic states
dynamic control
Disassemblers
Decompilers
debuggers
biblio
Dynamic malware analysis of phishing emails
Submitted by aekwall on Mon, 06/24/2019 - 1:41pm
potentially new malwares
Malware Analysis
malware authors
malware samples
Metrics
network communication
operating system
Phishing
phishing emails
malware
pubcrawl
Resiliency
Servers
Signature Generation
SPIM messages
standard analysis methodology
system monitoring
tools
digital signatures
anomaly signature
anti-malware
anti-virus products
automatic generation
complete dynamic analysis laboratory setting
comprehensive dynamic analysis
Computer crime
computer viruses
active signature
dynamic analysis laboratory setting
Dynamic Malware Analysis
Electronic mail
honeynet
Human behavior
internet
invasive software
biblio
VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS
Submitted by grigby1 on Mon, 06/10/2019 - 12:55pm
privacy
vulnerable-patched functions
vulnerable functions
vulnerability types
Vulnerability
VMPBL
tools
source files
software security
Software
security of data
security
Resiliency
resilience
real-world CWE vulnerabilities
pubcrawl
binary comparison
patched information
patch file
open source code
machine learning algorithms
machine learning
learning (artificial intelligence)
knowledge database
K-Trace algorithm
feature extraction
database management systems
composability
commas software security
Classification algorithms
binary comparison technique
« first
‹ previous
…
44
45
46
47
48
49
50
51
52
…
next ›
last »