Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
testing
biblio
Unit Regression Test Selection According To Different Hashing Algorithms
Submitted by aekwall on Mon, 06/08/2020 - 11:34am
Layout
hash algorithms
unit regression test selection
Testing process
regression test selection
in-depth review
hashing algorithms
hashing
resource usage
Manuals
security
Compositionality
regression analysis
testing
program testing
Force
Synchronization
pubcrawl
Resiliency
Software
biblio
Detection of Spammers in the Reconnaissance Phase by machine learning techniques
Submitted by grigby1 on Fri, 05/15/2020 - 11:56am
pubcrawl
Xgboost
Twitter
testing
supervised learning
social networking (online)
Social Network Fake Profiles
security of data
Scalability
Resiliency
resilience
reconnaissance phase
artificial honeypot profiles
professional social networks
organizational social network
Network reconnaissance
machine learning techniques
machine learning algorithms
machine learning
learning (artificial intelligence)
Feature Based Strategy
DspamRPfast model
Conferences
Classification algorithms
biblio
Security Testing Of Active Optical Network Devices
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
passive exploration
tools
testing devices
testing
tested polygon
security testing
security
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Penetration Testing
Passive optical networks
active exploration
Optical network units
optical fibre networks
optical
Network reconnaissance
Network
Linux
Kali Linux
huawei
gpon
conducted testing
computer network security
analysis
active optical network devices
biblio
Performance Comparison of Intrusion Detection System Between Deep Belief Network (DBN)Algorithm and State Preserving Extreme Learning Machine (SPELM) Algorithm
Submitted by aekwall on Mon, 05/11/2020 - 11:18am
pedestrian detection
machine learning algorithms
machine learning classifier
Metrics
network intrusion detection
NSL- KDD dataset
NSL-KDD dataset
object detection
pattern classification
learning (artificial intelligence)
pedestrians
security of data
SPELM algorithm
state preserving extreme learning machine algorithm
State Preserving Extreme Learning Machine(SPELM)
testing
Training
DBN algorithm
pubcrawl
composability
Resiliency
Anomaly Detection
Classification algorithms
Computational modeling
cyber security
Data models
belief networks
Deep Belief Network
deep belief network algorithm
face recognition
feature extraction
feedforward neural nets
Intrusion Detection
intrusion detection system
biblio
LSTM for Anomaly-Based Network Intrusion Detection
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
network traffic
network system
Long-Short-Term Memory
CIDDS dataset
anomaly-based network intrusion detection
Long short-term memory
LSTM
computer science
deep learning
Recurrent neural networks
recurrent neural nets
Intrusion Detection
security of data
Anomaly Detection
testing
Training
network intrusion detection
Metrics
composability
pubcrawl
Resiliency
learning (artificial intelligence)
intrusion detection system
computer network security
biblio
Applying Convolutional Neural Network for Malware Detection
Submitted by grigby1 on Mon, 04/06/2020 - 2:24pm
malware detection
Training
testing
Source code analysis
source code
Resiliency
resilience
pubcrawl
Predictive models
Personnel
network coding
network administrators
Metrics
malware renders conventional detection techniques
malware detection efficiency
binary code analysis
malware
machine learning
learning (artificial intelligence)
knowledge based systems
invasive software
internet
feature extraction
deep learning
cyber physical systems
Convolutional Neural Networks (CNN)
convolutional neural networks
convolutional neural nets
computer network security
composability
biblio
ACT Testbot and 4S Quality Metrics in XAAS Framework
Submitted by grigby1 on Mon, 03/09/2020 - 2:38pm
software prototyping
metrics reports
program debugging
program testing
pubcrawl
regression testing
security
Security Metrics
security of data
security testing
service models
Software as a service
software metrics
software product
metrics dashboard
software quality
Software Testing
T-Model
test management tools
TestBot
testing
testing as a service
Testing process
testing tools
tools
XaaS (Everything as a Service)
XAAS framework
cloud
metrics testing
4S quality metrics
ACT TestBot tool
agile environment
agile methodology
Auto Bug Logging and Tracking
automated continuous testing
Automatic testing
automation scripts
big data security metrics
bug logging
bug reporting tools
Measurement
cloud based service models
Cloud Computing
Computer bugs
Continuous Delivery
continuous deployment
Continuous Integration
continuous integration tools
Continuous Testing
data analysis
data analytics tools
Measurement and Metrics Texting
Metrics
biblio
A Systematic Requirements and Risks-Based Test Case Prioritization Using a Fuzzy Expert System
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
requirements risks-based testing
testing
test case prioritization
systematic requirements
software requirements
software engineers
software engineering
software components
Software
Security Risk Estimation
security
Scalability
risk-based approaches
risk information
risk estimation process
Resiliency
False Data Detection
regression testing
regression analysis
pubcrawl
program testing
Metrics
Iron
Human Factors
Human behavior
fuzzy set theory
fuzzy expert systems
fuzzy expert system
Expert Systems and Security
expert systems
estimation
Complexity theory
biblio
Advance Persistant Threat and Cyber Spying - The Big Picture, Its Tools, Attack Vectors and Countermeasures
Submitted by grigby1 on Wed, 02/26/2020 - 4:40pm
Meterpreter
Wireshark
Vectors
Traceroute
tools
threat vectors
testing
skilled cybercriminal
Reconnaissance
pubcrawl
privacy
primary security concerns
Organizations
Metrics
advance persistant threat
Measurement
malware
Kali Linux
HPING3 Metasploit-Framework
Foot-printing
cyber spying
Computer crime
Clearing Tracks
big picture
big organizations
Attack vectors
advanced persistent threat
Advance Persistent Threat
biblio
When Capacitors Attack: Formal Method Driven Design and Detection of Charge-Domain Trojans
Submitted by grigby1 on Wed, 02/26/2020 - 4:39pm
information leakage paths
Trojan horses
trojan horse detection
trojan detection approaches
testing
supply chain security
Resiliency
resilience
pubcrawl
invasive software
integrated circuits
Integrated circuit modeling
integrated circuit industry
analog attacks
information flow tracking based solution
IC supply chain
Hardware
formal method driven design
Digital circuits
cyber physical systems
circuit-level properties
charge-domain trojans/vulnerabilities
charge-domain models
charge-domain leakage paths
Capacitors
capacitor-enabled attacks
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »