Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
testing
biblio
Analyzing active probing for practical intrusion detection in Wireless Multihop Networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:49am
active-probing-based network intrusion detection system
Ad hoc networks
Communication system security
frequency hop communication
Intrusion Detection
Routing protocols
security of data
testing
Wireless communication
wireless mesh network
wireless mesh networks
wireless multihop networks
wireless sensor networks
biblio
Making active-probing-based network intrusion detection in Wireless Multihop Networks practical: A Bayesian inference approach to probe selection
Submitted by BrandonB on Fri, 05/01/2015 - 9:48am
probe selection algorithm
WMN
wireless multihop networks
wireless mesh networks
Wireless communication
testing
testbed experimentation
Telecommunication standards
spread spectrum communication
security of data
security
Probes
active-probing-based network intrusion detection system
Intrusion Detection
indoor wireless mesh testbed
indoor communication
IEEE 802.11s
Equations
Bayesian model
Bayesian inference
Bayes methods
Bayes inference
AP-NIDS DogoIDS
biblio
State-of-the-Art: A Systematic Literature Review on Agile Information Systems Development
Submitted by BrandonB on Fri, 05/01/2015 - 8:08am
Abstracts
agile information systems development
agile ISD
Data collection
data collection techniques
extreme programming
Interviews
programming
Scrum
software engineering discipline
software prototyping
Systematics
testing
biblio
CorteXlab: A facility for testing cognitive radio networks in a reproducible environment
Submitted by BrandonB on Fri, 05/01/2015 - 8:06am
Minus
wireless sensor networks
universal software radio peripherals
testing facility
testing
software radio
software defined radio
SensLAB
SDR nodes
reproducible environment
PicoSDR nodes
Orbits
open-source toolkit GNU Radio
Nutaq
National Instruments
cognitive radio
MIMO
IoT-Lab wireless sensor nodes
Internet of Things
Interference
Hikob
field programmable gate arrays
electromagnetically shielded room
electromagnetic shielding
CorteXlab facility
controllers
controller
complex multinode cognitive radio scenarios
complex heterogeneous system scenarios
cognitive radio networks
biblio
Semi-synthetic data set generation for security software evaluation
Submitted by BrandonB on Thu, 04/30/2015 - 1:49pm
intrusion detection and prevention systems
virus infestation
Virtual machining
testing
synthetic data set generation
semisynthetic data set generation
self-learning intrusion detection systems
security software evaluation
security of data
scalable system behavior model
anomaly detection evaluation
Intrusion Detection
information and communication technology systems
ICT systems
ICT security systems
heuristic detection engines
Databases
Data models
data handling
Complexity theory
biblio
SimRT: An Automated Framework to Support Regression Testing for Data Races
Submitted by Anonymous on Fri, 10/24/2014 - 12:51pm
Concurrency
Data Races
Kernels
processes
Race Vulnerability Study and Hybrid Race Detection
Scalability and Composability
SoS Lablet
testing
Race Vulnerability Study and Hybrid Race Detection
biblio
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
Submitted by rvmeush on Fri, 09/26/2014 - 1:04pm
Computerized monitoring
dynamic analysis
Filters
Heuristic algorithms
Information analysis
information security
Performance analysis
privacy
Reactive power
Runtime
Symbolic Execution
taint analysis
testing
biblio
An Analysis of Fedora Security Profile
Submitted by vouk on Wed, 09/17/2014 - 6:32pm
Testing
Science of Security
Validation and Verification
Foundations
ACM CCS
cyber security
detection
Domain-Specific Security and Privacy Architectures
Fedora
Formal Methods and Theory of Security
foundations
Logic and Verification
Non-Operational Testing
prediction
Science of Security
security faults
Software and Application Security
testing
validation and verification
vulnerabilities
ACM CCS
Domain-Specific Security and Privacy Architectures
Cyber Security
Formal Methods and Theory of Security
Logic and Verification
Software and Application Security
biblio
Diversity-based Detection of Security Anomalies
Submitted by vouk on Wed, 09/17/2014 - 6:32pm
Testing
Systems Engineering
Science of Security
Validation and Verification
CPS Technologies
Foundations
ACM CCS
Attack detection
CPS Technologies
cyber security
diversity
foundations
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
redundancy in security
Science of Security
systems engineering
testing
validation and verification
web services
ACM CCS
Cyber Security
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
file
Introducing Combinatorial Testing in a Large Organization: Pilot Project Experience Report
Submitted by rick.kuhn on Sat, 04/26/2014 - 8:17am. Contributors:
Rick Kuhn
Jon Hagar
Raghu Kacker
Tom Wissink
Abstract
assurance
combinatorial methods
Grand Software Testing
Lockheed Martin
testing
National HCSS Conference 2014
NIST
U.S. Government
Industry
Poster
HCSS'14
HCSS'14: Poster Session
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
next ›
last »