Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Vulnerability
biblio
Diverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive: A Review
Submitted by grigby1 on Thu, 05/11/2023 - 4:47pm
malicious code
SQLIA
SQL injection attack
review
Resiliency
Mobile Security
command injection attacks
web security
Government
SQL injection
Market research
machine learning
Cybersecurity
Vulnerability
Structured Query Language
application security
Data Security
composability
Companies
resilience
Metrics
pubcrawl
biblio
Vulnerability analysis of Cyber-physical power system based on Analytic Hierarchy Process
Submitted by grigby1 on Fri, 02/03/2023 - 3:40pm
pubcrawl
Metrics
resilience
Resiliency
Conferences
Indexes
information technology
Vulnerability
composability
Robustness
simulation
Couplings
power systems
cyber-physical power system
power grid vulnerability analysis
Comprehensive criticality
biblio
CVSS-based Vulnerability and Risk Assessment for High Performance Computing Networks
Submitted by aekwall on Thu, 02/02/2023 - 5:45pm
real-time systems
standardization
pubcrawl
Scalability
Resiliency
Knowledge engineering
Throughput
network security
Stochastic processes
CVSS
attack graph
Numerical models
HPC
Vulnerability
risk assessment
Stochastic Computing Security
biblio
WhatsApp: Cyber Security Risk Management, Governance and Control
Submitted by aekwall on Fri, 01/13/2023 - 3:58pm
pubcrawl
whatsapp
Vulnerability
threat
social networking (online)
Security Risk Management
security
Scalability
risks
risk management
Resiliency
Access controls
Mobile Applications
Metrics
Internet telephony
Human Factors
Governance
Freeware
data science
controls
assets
biblio
Comparative Analysis of Risk Assessment During an Enterprise Information Security Audit
Submitted by grigby1 on Fri, 01/13/2023 - 1:46pm
pubcrawl
Vulnerability
Time measurement
Security Audits
Scalability
risks
risk management
risk assessment
Resiliency
resilience
expert systems
Planning
Organizations
information security audit
information security
Human behavior
Costs
Analytical models
security
biblio
Metrics for Assessing Security of System-on-Chip
Submitted by grigby1 on Thu, 01/05/2023 - 5:39pm
pubcrawl
Metrics
Hardware
Benchmark testing
side-channel attacks
Measurement
Vulnerability
Systematics
supply chains
SoC
threat
mathematical models
impact
supply chain risk assessment
biblio
Windows 10 Operating System: Vulnerability Assessment and Exploitation
Submitted by grigby1 on Fri, 12/23/2022 - 11:53am
security
pubcrawl
Metrics
Resiliency
Software
Instruments
Vulnerability
composability
operating systems
Penetration Testing
testing
vulnerability assessment
Windows Operating System Security
cyber-attack
System performance
Windows 10
biblio
PIT: A Probe Into Internet of Things by Comprehensive Security Analysis
Submitted by aekwall on Fri, 08/12/2022 - 4:02pm
composability
Engines
framework
fuzzing
Generators
Human behavior
Internet of Things
Protocols
pubcrawl
Resiliency
security
Security analysis
security and privacy
static analysis
Vulnerability
biblio
A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI
Submitted by grigby1 on Thu, 07/28/2022 - 2:08pm
privacy
weakness
Vulnerability
static analysis
Software
smell
security
Resiliency
resilience
Repository
PyPI
pubcrawl
Bandit
Measurement
linting
issue
Human behavior
Ecosystems
Ecosystem
defect
composability
codes
bug
biblio
Mining Learner-friendly Security Patterns from Huge Published Histories of Software Applications for an Intelligent Tutoring System in Secure Coding
Submitted by grigby1 on Wed, 06/08/2022 - 1:54pm
intelligent tutoring systems
Vulnerability
Training
Software
Scalability
Resiliency
resilience
pubcrawl
Prototypes
Knowledge Discovery
expert systems
intelligent data
Explainable Knowledege
encoding
Comprehensibility
Compositionality
Big Data in Software Engineering
Big Data
association rules
security
1
2
3
4
5
6
7
8
9
…
next ›
last »