Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software vulnerabilities
biblio
Test Case Filtering based on Generative Adversarial Networks
Submitted by grigby1 on Thu, 08/03/2023 - 1:12pm
machine learning
pubcrawl
Metrics
resilience
Resiliency
Scalability
Routing
software vulnerabilities
fuzzing
Switches
Training data
simulation
generative adversarial networks
Generative Adversarial Learning
biblio
An Empirical Study On Software Metrics and Machine Learning to Identify Untrustworthy Code
Submitted by grigby1 on Fri, 04/01/2022 - 1:47pm
machine learning
pubcrawl
Medical services
Decision Making
Metrics
Europe
Government
Security Metrics
software metrics
codes
Code Trustworthiness Assessment
Consensus-Based Decision-Making
software vulnerabilities
biblio
Securely Taking on New Executable Software Of Uncertain Provenance
Submitted by willirn1 on Tue, 10/26/2021 - 5:39pm
Software
automation
risk mitigation
security
Cybersecurity
software vulnerabilities
C3E
trustworthiness
biblio
Measuring Impact Score on Confidentiality, Integrity, and Availability Using Code Metrics
Submitted by grigby1 on Wed, 11/04/2020 - 12:35pm
object-oriented methods
vulnerable source code
source code (software)
software vulnerabilities
software security
software quality metrics
software quality
software metrics
Software
security of data
Security Metrics
security
secure software
pubcrawl
PHP security
object-oriented PHP application
Availability Score
Object oriented modeling
national vulnerability database
metrics testing
Metrics
Measurement
Integrity Score
CVSS
Couplings
Correlation
Confidentiality Score
Complexity theory
code metrics
Code Characteristics
CIA Model
biblio
Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System
Submitted by aekwall on Mon, 10/26/2020 - 10:45am
Drone
Weapons
software vulnerabilities
Linux operating system
2.0
AR
AR Drone 2.0
Busybox
CVE
autonomous aerial vehicles
embedded
embedded Linux system
open WiFi network
pairing mode
Parrot
SSH Tunnel
Linux Operating System Security
Metrics
computer network security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
security
tools
vulnerabilities
Vulnerability Analysis
public domain software
wireless LAN
Streaming media
Predictive Metrics
biblio
Beware of the Vulnerability! How Vulnerable are GitHub's Most Popular PHP Applications?
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
PHP
CVSS
critical vulnerabilities
GitHub
injection vulnerabilities
open source
open source PHP applications
open source project owners
open source projects
software vulnerabilities
project popularity
RIPS
scanning
software project
Software Vulnerability
static analysis vulnerability scanner
vulnerable project
Cross Site Scripting
Computer bugs
data integrity
security
Resiliency
Human behavior
pubcrawl
tools
software engineering
static analysis
Scalability
statistical analysis
software security
vulnerability detection
Computers
cross-site scripting
XSS
Open Source Software
biblio
Automation Framework for Software Vulnerability Exploitability Assessment
Submitted by aekwall on Mon, 09/28/2020 - 10:34am
common vector scoring system
third-factor access complexity
Structural Severity
software vulnerability exploitability assessment
software structural properties
software development sector
security flaws
secure software
reachability
Entry points
de facto metrics system
CVSS exploitability measures
security of data
automated exploit attack
access vector
software vulnerabilities
security risks
Automated Secure Software Engineering
software engineering
reachability analysis
vulnerabilities
composability
pubcrawl
Resiliency
biblio
Vulnerability Discovery Modelling With Vulnerability Severity
Submitted by grigby1 on Fri, 09/11/2020 - 10:58am
risk analysis
Web browser
vulnerability severity
vulnerability discovery rate
vulnerability discovery process
vulnerability discovery models highlight
vulnerability discovery modelling
Vulnerability discovery model
vulnerability data
vulnerabilities
severity
predictive capability
Browser Security
Compositionality
Browsers
security of data
online front-ends
software vulnerabilities
composability
software fault tolerance
Data models
Mathematical model
Analytical models
Software
resilience
Metrics
Human behavior
pubcrawl
security
Predictive models
biblio
Privacy-Enabled Recommendations for Software Vulnerabilities
Submitted by aekwall on Mon, 03/23/2020 - 12:30pm
recommender systems
vulnerability profiles
vulnerability prioritization data
software vulnerabilities
software reliability
Software
slow process
SGX
security of data
security
Scalability
Resiliency
Complexity theory
recommender system
recommender
pubcrawl
privacy-enabled recommendations
privacy
Organizations
malicious operator
Human Factors
data privacy
data integrity
costly process
biblio
Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management
Submitted by aekwall on Mon, 02/10/2020 - 11:10am
Software
Scalability
security breaches
Security Evaluation
security of data
security patch
security patch management
security threats
Servers
push-type patch management
software assurance
software vulnerabilities
stochastic reward net
system security
virtual machine
virtual machine based intrusion tolerant system
virtual machines
VM-based intrusion-tolerant system
intrusion tolerance
attack behavior
composability
composite stochastic reward net model
Computational modeling
computer security
computer systems
defense behaviors
interval availability
Resiliency
malicious attack
Markov processes
Markov regenerative process
periodic vulnerability checking strategy
phase expansion
point-wise availability
pubcrawl
pull-type patch management
1
2
next ›
last »