Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
program debugging
biblio
OWL: Understanding and Detecting Concurrency Attacks
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
Computer bugs
Predictive Metrics
Concurrency
Software Testing
single-threaded programs
OWL source code
OWL
knowledge representation languages
concurrency bug detectors
concurrency attack exploit scripts
Concurrency Attack
bug-inducing inputs
Concurrent computing
concurrency control
security
cyber-physical system
cyber-physical systems
Instruction sets
program debugging
public domain software
Linux
composability
Resiliency
Metrics
pubcrawl
resilience
tools
biblio
Cross-Entropy: A New Metric for Software Defect Prediction
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
pubcrawl
Task Analysis
source code (software)
source code
software repository
software quality assurance
software quality
software metrics
software defect prediction
software bugs
Software
Semantics
recurrent neural network language model
recurrent neural nets
code metric
program debugging
predictive security metrics
Predictive models
natural language processing
Metrics
Measurement
language model
Entropy
DefectLearner
deep learning
cross-entropy
Computer bugs
code naturalness
biblio
Mining Software Repositories for Predictive Modelling of Defects in SDN Controller
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
predictive modelling
Stochastic processes
software release management
software metrics
software development management
software defined networking control plane
software defined networking
software defect metrics
Software
security
Reliability
public domain software
pubcrawl
Protocols
program debugging
production grade SDN controller
predictive security metrics
OpenDaylight architecture
open source SDN controller platform
network operating system
mining software repositories
Metrics
Git version control system
Data mining
control systems
Configuration Management
computer network management
Computer bugs
bug repository
bug removal rates
bug manifestation
bug characteristics
biblio
Checked C: Making C Safe by Extension
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
incremental conversion
tools
storage management
static analysis
spatial safety
security
Safety
Safe Coding
Resiliency
resilience
pubcrawl
programming languages
program debugging
policy-based governance
performance evaluation
Metrics
backward-compatibility
Human Factors
Human behavior
highly performant code
developer control
Cyclones
Computer bugs
collaboration
checked region
checked pointer
checked C's design
C++ language
C safe
bounds-safe interfaces
Benchmark testing
biblio
Embedding Non-Compliant Nodes into the Information Flow Monitor by Dependency Modeling
Submitted by grigby1 on Mon, 08/26/2019 - 11:06am
Information Flow Monitor approach
unalterable blackbox nodes
system monitoring
semantic dependencies
Scalability
Resiliency
resilience
pubcrawl
program debugging
noncompliant nodes
network node
multiple hops
Monitoring
Metrics
Compositionality
information flow monitor
IFM protocol
Human Factors
Human behavior
heterogeneous networks
distributed computing
dependency structures
dependency modeling
cyber-physical systems
cyber physical systems
Cyber Dependencies
CPS
Conferences
biblio
Is Predicting Software Security Bugs Using Deep Learning Better Than the Traditional Machine Learning Algorithms?
Submitted by aekwall on Mon, 07/01/2019 - 10:14am
Predictive models
Support vector machines
software security bugs
software quality metrics
software quality
software metrics
software insecurity
Software
security-related bugs
security of data
Security Metrics
security breaches
security
Random Forest
pubcrawl
program debugging
predictive security metrics
Naive Bayes
multilayer deep feedforward network
Metrics
machine learning
learning (artificial intelligence)
feedforward neural nets
Feedforward Artificial Network
deep learning technique
deep learning
Decision trees
Decision Tree
Computer bugs
Bug Propensity Correlational Analysis
Bayes methods
biblio
T-Fuzz: Fuzzing by Program Transformation
Submitted by grigby1 on Thu, 02/14/2019 - 11:20am
program analysis
tools
taint analysis
t-fuzz approach
symbolic execution-based approach
software bugs
Software
security of data
security
randomly generated inputs
pubcrawl
program verification
program transformation
program testing
program diagnostics
program debugging
bug finding
Metrics
Libraries
input mutation techniques
input checks
fuzzing transformed programs
fuzzing
fuzzer-generated inputs
Fuzz
dynamic tracing based technique
deep execution paths
coverage-guided fuzzer
Computer bugs
composability
code paths
biblio
Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers
Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
sentiment analysis
Perturbation methods
Prediction algorithms
program debugging
pubcrawl
real-world text datasets
Recurrent neural networks
resilience
scoring strategies
pattern classification
Task Analysis
text analysis
text classification
text input
text perturbations
White Box Security
word embedding
adversarial samples
misclassification
Metrics
machine learning
learning (artificial intelligence)
IMDB movie reviews
Enron spam emails
DeepWordBug
deep learning classifiers
deep learning
composability
character-level transformations
black-box generation
black-box attack
black box attack
adversarial text sequences
biblio
Scalable Framework for Accurate Binary Code Comparison
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
maximum common subgraph
CG
comparison algorithm
empiric results heuristic method
exact matches
extensive binaries
forward slicing
functions matching process parallelization
heavily modified functions
high matching quality
IdaPro disassembler
main stages
matched vertices
matching process
call graph
old versions
PDG
practical applications
program dependence graph
programmatic changes
real world libraries
scalable framework
slightly modified functions
statically linked libraries
target program
unchanged modified functions
well-known bugs prevention
Libraries
graph theory
privacy
pubcrawl
Human behavior
invasive software
Algorithm design and analysis
tools
Semantics
Cloning
program diagnostics
Malware Analysis
resilience
Metrics
static analysis
Computer bugs
Resiliency
program debugging
Program slicing
Binary codes
accurate binary code comparison
backward slicing
binary code clone detection
Binary code comparison
binary files
Binnavi platform
calculated heuristics
biblio
Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
SD-card storage manager
Named Data Network Security
open-source designs
pattern classification
program debugging
program verification
pubcrawl
Registers
resilience
Resiliency
robotics controller
Scalability
Local area networks
security
security of data
sequential logic
SIMAREL
specification languages
storage management
STREAMS policies
unbounded input streams
user interfaces
Wires
Ethernet controller
automatically-synthesized relational invariants
circuit executions
core design C
debugging interface
declassification
digital signal processing chips
digital-signal processing module
Domain-Specific Language
DSP module
dynamic conditions
Algorithm design and analysis
field programmable gate arrays
flash memories
flash memory controller
flow security
Hardware
Hardware design languages
Human behavior
human computer interaction
information leaks
information-flow policies
« first
‹ previous
1
2
3
4
next ›
last »