Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
testing
biblio
Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
novel clustering ensemble method
untrustworthy testing party
untrustworthy testing parties
Unsupervised Learning
trusted hardware Trojan detection framework
Trusted Computing
Trojan horses
trojan horse detection
testing stage
testing
robust hardware Trojan detection framework
pubcrawl
pattern clustering
novel clustering ensemble technique
Clustering algorithms
invasive software
integrated circuit testing
Integrated circuit modeling
IC
hardware Trojan detection
Hardware Security
Hardware
golden models-free hardware Trojan detection framework
fabrication process
fabrication
existing hardware Trojan detection
clustering ensemble
biblio
Enhancing the Naive Bayes Spam Filter Through Intelligent Text Modification Detection
Submitted by aekwall on Mon, 02/25/2019 - 11:42am
spam filter
pubcrawl
Python algorithm
Scalability
social networks
spam
spam classification
spam detection
spam emails
pattern classification
spam score
Spamassassin
testing
text analysis
text classification
text modifications
unsolicited e-mail
Unsolicited electronic mail
intelligent text modification detection
Bayes Spam Filter
Bayesian Poisoning
computer security
e-mail filters
Email
email communication
feature extraction
Human behavior
Bayes methods
Internet based information exchange venues
learning (artificial intelligence)
machine learning
machine learning algorithm
machine learning algorithms
Metrics
naïve Bayes classifier
Naive Bayes Spam Filter
biblio
Artificial Intelligence (AI) for Web Accessibility: Is Conformance Evaluation a Way Forward?
Submitted by grigby1 on Thu, 01/31/2019 - 12:11pm
privacy
World Wide Web
Web Standards
verification
testing
Scalability
Resiliency
resilience
pubcrawl
Accessibility for People with Disabilities
machine learning
Human Factors
Human behavior
Conformance
Assistive Technology
Artificial Intelligence
AI and Privacy
AI
biblio
Vulnerability Detection on Mobile Applications Using State Machine Inference
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
Mobile Applications
vulnerability detection
testing methodology
testing
state machine learning
state machine inference
security violations
security of data
security
Resiliency
pubcrawl
program testing
model inference
mobile computing
Android (operating system)
mobile application security
Mobile Application
mobile Android applications
Metrics
machine learning
learning (artificial intelligence)
Inference algorithms
Humanoid robots
Human behavior
finite state machines
Compositionality
Androids
biblio
Development of a suite of IPv6 vulnerability scanning tests using the TTCN-3 language
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
test maintainability
program testing
Protocols
Prototypes
pubcrawl
Resiliency
security of data
specification languages
telecommunication computing
telecommunication security
test extensibility
passive analysis
test specification language
testing
Testing and Test Control Notation version 3
transport protocols
TTCN-3
TTCN-3 language
vulnerability assessment
vulnerability detection
Vulnerability Management
vulnerability scanning
Human behavior
application security
attacks simulation
Compositionality
Computer crime
denial of service
denial-of-service attack detection
Device Security
dual-stack networks
Duplicate Address Detection
Formal Specification
Address autoconfiguration
ICMPv6 Protocol
internet
IP networks
IPv4 IPv6 protocol
IPv6
IPv6 networks
IPv6 vulnerability scanning tests
Linux
Metrics
network communications
biblio
A virtual laboratory approach for risk assessment of aerospace electronics trust techniques
Submitted by grigby1 on Mon, 12/03/2018 - 1:51pm
supply chain management
pubcrawl
Reliability
resilience
Resiliency
risk management
Scalability
semiconductor technologies
space vehicle electronics
procurement path
supply chain risk
supply chain risk assessment
supply chains
testing
trusted procurement options
US Department of Defense
virtual instrumentation
virtual laboratory approach
faulty component risk
aerospace electronic component risk assessment methodology
aerospace electronics trust techniques
aerospace testing
component criticality risk tolerance
component testing
Consumer electronics
counterfeit mitigation calculations
counterfeit risk
actionable decision data
Logistics
Metrics
microelectronics trust assurance
mitigation strategies
nontrusted procurement options
optimal test
part reliability
Procurement
biblio
Bottester: Testing Conversational Systems with Simulated Users
Submitted by grigby1 on Wed, 11/28/2018 - 2:01pm
chatbot
conversational agents
Human behavior
Metrics
pubcrawl
Scalability
testing
biblio
OpenUAV: A UAV Testbed for the CPS and Robotics Community
Submitted by Katie Dey on Mon, 07/30/2018 - 1:31pm
Testing
Robotics
Simulation
Foundations
1521617
foundations
robotics
simulation
testbed
testing
uav
1521617
biblio
Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
SQL injection
privacy
program testing
pubcrawl
Regular Expression Inference
Resiliency
search problems
software maintenance
SQL
Policy-Governed Secure Collaboration
SQL Injection attacks
testing
vulnerabilities detection
vulnerable WAFs
WAF rule set
web application firewalls
Web application firewalls repair
web security
Human behavior
collaboration
combinatorial mathematics
combinatorial optimisation problem
Decision trees
filter rules
firewalls
Firewalls (computing)
genetic algorithms
Automated Testing
internet
learning (artificial intelligence)
legitimate requests
machine learning
multiobjective genetic algorithms
Policy
policy-based governance
biblio
The approach to finding errors in program code based on static analysis methodology
Submitted by grigby1 on Thu, 06/07/2018 - 3:12pm
semantic information
tools
testing
syntax tree
Syntactics
syntactic information
static program code analysis
static code analysis methodology
static code analysis
source code (software)
source code
software quality
Semantics
Bars
Resiliency
resilience
pubcrawl
program diagnostics
program code Error detection
increase of efficiency
Human behavior
embedded computing
efficiency improvement
diagnostic rules
composability
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »