Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Scalable Framework for Accurate Binary Code Comparison
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
maximum common subgraph
CG
comparison algorithm
empiric results heuristic method
exact matches
extensive binaries
forward slicing
functions matching process parallelization
heavily modified functions
high matching quality
IdaPro disassembler
main stages
matched vertices
matching process
call graph
old versions
PDG
practical applications
program dependence graph
programmatic changes
real world libraries
scalable framework
slightly modified functions
statically linked libraries
target program
unchanged modified functions
well-known bugs prevention
Libraries
graph theory
privacy
pubcrawl
Human behavior
invasive software
Algorithm design and analysis
tools
Semantics
Cloning
program diagnostics
Malware Analysis
resilience
Metrics
static analysis
Computer bugs
Resiliency
program debugging
Program slicing
Binary codes
accurate binary code comparison
backward slicing
binary code clone detection
Binary code comparison
binary files
Binnavi platform
calculated heuristics
biblio
Impact of unreliable positioning in location-based routing protocols for MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
mobile computing
unreliable positioning
tools
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
quality of service
pubcrawl
privacy
positioning error
node scalability
network overhead
network lifetime
Ad hoc networks
mobile ad hoc networks
Metrics
MANET
location-based routing protocols
Energy Efficiency
effective routing
DYMOselfwd
DYMO
Data Security
data privacy
Compositionality
AODV-Line
AODV
biblio
Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Languages
Submitted by grigby1 on Mon, 06/11/2018 - 3:46pm
collaboration
middleware security
security extension
modelling language
middleware
cyber security requirements
cyber security concepts
Business Process Model and Notation
business process
business data processing
BPMN processes
BPMN
specification languages
policy-based governance
resilience
Policy
Resiliency
Complexity theory
Formal Specification
visualization
Semantics
tools
computer security
security framework
security of data
composability
pubcrawl
biblio
An authorized security middleware for managing on demand infrastructure in cloud
Submitted by grigby1 on Mon, 06/11/2018 - 3:45pm
On-demand security
cloud demand infrastructure management
cloud stack
Dual authorization
Dual-Authorization
Dynamic infrastructure request control
handle On-demand Infrastructure request
IaaS
on-demand request
on-demand scheduler
auto scalability feature
on-demand service request handling
rapid elasticity
secure environment
security risks
ubiquitous computing
ubiquitous network access
virtualized computing platform
VM
middleware security
tools
pubcrawl
composability
Scalability
security of data
Cloud Computing
Servers
cloud users
virtualisation
authorization
resilience
Heuristic algorithms
security issues
middleware
Resiliency
Policy
collaboration
policy-based governance
authorized security middleware
Auto scalability
biblio
Identifying and Documenting False Positive Patterns Generated by Static Code Analysis Tools
Submitted by grigby1 on Thu, 06/07/2018 - 3:12pm
public domain software
warning message
tools
system documentation
static code analysis tools
static code analysis
software tools
software engineering
security
Resiliency
resilience
commercial tool
pubcrawl
program diagnostics
open-source tools
Open Source Software
Human behavior
false positive pattern identification
false positive pattern documentation
Context
Conferences
composability
biblio
The approach to finding errors in program code based on static analysis methodology
Submitted by grigby1 on Thu, 06/07/2018 - 3:12pm
semantic information
tools
testing
syntax tree
Syntactics
syntactic information
static program code analysis
static code analysis methodology
static code analysis
source code (software)
source code
software quality
Semantics
Bars
Resiliency
resilience
pubcrawl
program diagnostics
program code Error detection
increase of efficiency
Human behavior
embedded computing
efficiency improvement
diagnostic rules
composability
biblio
A live static code analysis architecture for PLC software
Submitted by grigby1 on Thu, 06/07/2018 - 3:12pm
programmable controllers
tools
timing
static code analysis
static analysis
software engineering
Software
Resiliency
resilience
regular compiler
pubcrawl
composability
program diagnostics
PLC software
live static code analysis architecture
IEC standards
IEC 61131-3
Human behavior
development process
debugging
control engineering computing
computer architecture
biblio
Detecting Security Vulnerabilities in Object-Oriented PHP Programs
Submitted by grigby1 on Thu, 06/07/2018 - 3:02pm
PHP
tools
static analysis
security vulnerability detection
security analysis tool
security
safety-critical software
Resiliency
resilience
pubcrawl
program diagnostics
program debugging
PIXY PHP security analyzer
analysis
OOPIXY
object-oriented programming
object-oriented PHP programs
object oriented security
object orientation feature
microbenchmarks
Metrics
feature extraction
dynamic languages
computer architecture
composability
Benchmark testing
biblio
Towards an Attack Signature Generation Framework for Intrusion Detection Systems
Submitted by grigby1 on Wed, 05/30/2018 - 4:05pm
security of data
XPath injection
XML
web services
Web Service
web security testing tools
Weapons
tools
SOAP injeciton
Simple object access protocol
signature IDSs
Signaturebased Intrusion Detection Systems
signature based defense
Servers
attacks
Scalability
Resiliency
resilience
pubcrawl
privilege escalation
organizations valuable information resources
Information Leakage
genetic algorithms
deployed web services
attack signatures
attack signature generation framework
attack signature generation approach
biblio
Quantification on the efficiency gain of automated ridesharing services
Submitted by el_wehby on Fri, 05/25/2018 - 3:47pm
local search method
vehicle flows
Transportation network
tools
search problems
road vehicles
road traffic
Pricing
passenger demand
numerical tools
models on-demand dispatchable vehicles
Measurement
actual demand
Laplace equations
human drivers
equivalent convex program
efficiency gain
direct control
difference-of-convex algorithm
DCA
convex programming
constant rebalancing vehicle supply
autonomous vehicles
automated ridesharing services
1536086
« first
‹ previous
…
50
51
52
53
54
55
56
57
58
…
next ›
last »