Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Python
biblio
Watchman: Monitoring Dependency Conflicts for Python Library Ecosystem
Submitted by aekwall on Mon, 02/08/2021 - 1:40pm
Monitoring
Scalability
Resiliency
pubcrawl
Metrics
tools
Libraries
automation
Python
software engineering
Ecosystems
software ecosystem
Human Factors
Compositionality
Cyber Dependencies
dependency conflicts
biblio
Classification of Websites Based on the Content and Features of Sites in Onion Space
Submitted by grigby1 on Fri, 01/15/2021 - 12:23pm
feedback
website classification
Tor
text analysis methods
site features
site content
parsing sites
onion-sites
onion space
onion site classification
features of onion sites
Dark Net
categories of onion sites
analysis of onion sites
Human Factors
dark web
learning (artificial intelligence)
neural network training
Python
Uniform resource locators
Electronic mail
documentation
Web sites
feature extraction
neural nets
pattern classification
internet
Human behavior
pubcrawl
Neural networks
machine learning
Training
biblio
RPC Based Framework for Partitioning IoT Security Software for Trusted Execution Environments
Submitted by aekwall on Mon, 11/09/2020 - 1:19pm
side-channel attacks
Information Reuse and Security
trusted execution environments
TEE integration time
software partitioning
RPC-based solutions
RPC-based framework
RPC based framework
RPC
remote procedure calls
partitioning security components
partitioning
IoT security software
interface definition language files
graphical user interface
graphical user interfaces
security of data
framework
TEE
Compositionality
information security
Java
software engineering
Python
Libraries
pubcrawl
Resiliency
Protocols
security
IoT devices
Internet of Things
Servers
biblio
Using Software Metrics for Predicting Vulnerable Code-Components: A Study on Java and Python Open Source Projects
Submitted by aekwall on Mon, 11/02/2020 - 2:46pm
Python vulnerable function prediction
vulnerability predictors
vulnerability prediction performance
Vulnerability prediction
testing
software security
software reliability
software projects
software metrics-based vulnerability prediction
software metrics
security vulnerabilities
security of data
security
safety-critical software
code component
Python open source projects
Python
public domain software
pubcrawl
Metrics
metrics testing
Measurement
machine learning
learning (artificial intelligence)
Java vulnerable functions
Java projects
Java
code-component
biblio
Detection of Phishing Attacks with Machine Learning Techniques in Cognitive Security Architecture
Submitted by aekwall on Mon, 09/14/2020 - 12:32pm
Artificial Intelligence
URL analysis
python tools
phishing web attacks detection
cybersecurity analysts
cognitive security architecture
cognitive security application
Artificial Neural Networks
computational intelligence
Compositionality
Uniform resource locators
Data Analytics
Phishing
Cryptography
Python
data analysis
machine learning techniques
Cybersecurity
internet
Computer crime
machine learning
composability
pubcrawl
learning (artificial intelligence)
machine learning algorithms
Big Data
biblio
K-Nearest Neighbors and Grid Search CV Based Real Time Fault Monitoring System for Industries
Submitted by grigby1 on Fri, 05/22/2020 - 2:23pm
model-based techniques
flask
graphical user interface (GUI)
grid search cross validation
grid search CV
induction machine
Induction machines
K-Nearest Neighbors (KNN)
KNN
knowledge-based approach
Feature Selection
Python
python web framework
real time fault monitoring
signature extraction-based approach
Statistics
time fault monitoring system
user friendly interface
nearest neighbor search
nearest neighbour methods
pubcrawl
Circuit faults
Data models
internet
Industries
production engineering computing
Classification algorithms
Metrics
Measurement
grid search
Prediction algorithms
k-nearest neighbors
user interfaces
condition monitoring (CM)
cross validation (CV)
fault detection
fault detection techniques
fault diagnosis
biblio
ICS/SCADA Device Recognition: A Hybrid Communication-Patterns and Passive-Fingerprinting Approach
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
documentation
computerised monitoring
industrial control
industrial control system
SCADA Systems Security
Compositionality
TCPIP
defense augmentation
Device recognition
Object recognition
hybrid communication-patterns
ICS/SCADA device recognition
Industrial Control Systems
legacy ICS/SCADA systems
network data fingerprinting
passive-fingerprinting
SCADA fingerprinting
security of data
software maintenance
security vulnerabilities
Python
production engineering computing
Databases
pubcrawl
Human behavior
Resiliency
cyber-physical systems
supervisory control and data acquisition systems
SCADA systems
mobile computing
Protocols
security
Internet of Things
biblio
Share, But Be Aware: Security Smells in Python Gists
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
recurrent coding patterns
tools
static code analysis
static analysis
software security
software maintenance
share code snippets
security weaknesses
security smell
security breaches
security
safety-critical software
Resiliency
resilience
composability
Python
publicly-available Python Gists
publicly-available GitHub Gists
pubcrawl
program diagnostics
password
insecure coding practices
Human behavior
hard-coded secrets
hard-coded passwords
GitHub
Gist
encoding
biblio
A Dynamic Detection Technique for XSS Vulnerabilities
Submitted by aekwall on Mon, 12/16/2019 - 2:17pm
internet
XSS vulnerabilities
web applications
Uniform resource locators
tools
testing
simulated attack
Servers
security of data
Scalability
resilience
Python language
Python
pubcrawl
Linux
attacks simulation
Human behavior
feature extraction
dynamic detection process
dynamic detection
detection tool
cross-site scripting(XSS)
cross-site scripting attack
cross-site scripting
Cross Site Scripting
Crawlers
crawler module
black-box testing
black box vulnerabilities detection
biblio
Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques
Submitted by grigby1 on Thu, 09/26/2019 - 10:25am
resilience
tools
Text Mining
standards
SQL injection vulnerabilities
SQL injection
SQL
source code (software)
software vulnerabilities
Software
singular decision trees
security of data
security
Secure Coding
Safe Coding
Resiliency
code analysis
Python
pubcrawl
program diagnostics
policy-based governance
natural language techniques
natural language processing
Metrics
Java program
Java byte code
Java
Human Factors
Human behavior
Decision trees
collaboration
code analysis tools
« first
‹ previous
1
2
3
4
next ›
last »