Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vulnerabilities
file
Malik_Visual_variational_callgraph_CK.pdf
Submitted by Jamie Presken on Thu, 12/08/2016 - 8:51am
#ifdef
Apr'16
callgraph
CMU
configuration complexity
dependencies
Linux kernel
visualization
vulnerabilities
biblio
Visualizing the variational callgraph of the Linux Kernel: An approach for reasoning about dependencies
Submitted by Jamie Presken on Mon, 04/25/2016 - 10:06am
#ifdef
Apr'16
callgraph
CMU
configuration complexity
dependencies
Linux kernel
visualization
vulnerabilities
CMU
Apr'16
biblio
A Practical Experience on the Impact of Plugins in Web Security
Submitted by BrandonB on Tue, 05/05/2015 - 10:53am
security of data
web security
Web pages
web applications
Web application plugin vulnerabilities
vulnerabilities
testing
static code analysis tools
static analysis
SQL injection vulnerabilities
content management
security
program diagnostics
plugins
Manuals
internet
false positive rates
Databases
Cross Site Scripting
content management system
biblio
ETSSDetector: A Tool to Automatically Detect Cross-Site Scripting Vulnerabilities
Submitted by BrandonB on Tue, 05/05/2015 - 10:41am
interactivity
XSS attacks
web applications
vulnerabilities
testing
security of data
security
Qualifications
internet
Browsers
interactive systems
Filling
ETSSDetector
ETSS Detector
Databases
Data mining
cross-site scripting vulnerabilities
cross-site scripting
biblio
An Analysis of Fedora Security Profile
Submitted by vouk on Wed, 09/17/2014 - 6:32pm
Testing
Science of Security
Validation and Verification
Foundations
ACM CCS
cyber security
detection
Domain-Specific Security and Privacy Architectures
Fedora
Formal Methods and Theory of Security
foundations
Logic and Verification
Non-Operational Testing
prediction
Science of Security
security faults
Software and Application Security
testing
validation and verification
vulnerabilities
ACM CCS
Domain-Specific Security and Privacy Architectures
Cyber Security
Formal Methods and Theory of Security
Logic and Verification
Software and Application Security
« first
‹ previous
1
2
3
4
5
6
7