Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Semantics
biblio
A Graph-Based Modular Coding Scheme Which Achieves Semantic Security
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
error-correcting code
universal hash functions
theoretical cryptography
telecommunication security
Semantics
semantic security
Receivers
Random variables
pubcrawl
modular wiretap codes
graph-based modular coding scheme
graph theory
Gaussian channels
coding theory
error correction codes
encoding
Eigenvalues and eigenfunctions
edge-disjoint biregular graphs
discrete Gaussian wiretap channel
Cryptography
Compositionality
composability
channel coding
BRI function
biregular irreducible functions
security
biblio
An Enhanced Semantic-Based Cache Replacement Algorithm for Web Systems
Submitted by grigby1 on Tue, 02/18/2020 - 11:54am
Scalability
Web traffics
Web systems
Web performance
Web page
web objects
Web items
Web Caching
web cache
typical replacement policies
Servers
Semantics
semantic-aware caching policy
semantic-aware
semantic distance
pubcrawl
Resiliency
resilience
replacement algorithm
Pollution
Metrics
internet
delays
caching solution
caching mechanism
cache storage
Cache replacement policy
cache replacement algorithm
Blogs
biblio
Algebraic Patterns of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
sockets
symbolic modelling
rewriting rules
pattern creation
cyber reasoning systems
behaviour algebra
algebraic patterns
algebraic matching methods
algebraic matching
algebraic approach
algebra equations
Binary codes
binary code
Buffer overflows
Registers
Compositionality
Semantics
algebra
program diagnostics
pattern matching
vulnerability detection
Metrics
pubcrawl
Human behavior
Resiliency
biblio
Two-Level Algebraic Method for Detection of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 2:41pm
Human behavior
vulnerability pattern matching
vulnerability detection
Vulnerability
vulnerabilities detection
two-level algebraic method
Symbolic Execution
Semantics
Resiliency
pubcrawl
pattern matching
model checking
Metrics
Mathematical model
algebra
fuzzing
Formal Specification
formal methods
exploit
Cybersecurity
Compositionality
Buffer overflows
Binary codes
binary code
behavior matching
behavior algebra
algebra expressions
biblio
Learning to Identify Security-Related Issues Using Convolutional Neural Networks
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
open source issues
Semantics
user interfaces
agile development practices
aid development teams
CNN
high dimensional word embeddings
issue descriptions
Man-machine systems
natural language descriptions
security issues
robust security assurance
SDL
security-focused automation
security-related content
security-related requirements
software products
two-phase neural net architecture
vulnerability descriptions
software assurance
convolutional neural network
security
Kernel
computer architecture
learning (artificial intelligence)
pubcrawl
composability
deep learning
Databases
convolutional neural nets
security of data
Companies
ontologies (artificial intelligence)
Data mining
public domain software
software security
Scalability
software quality
Human Factors
biblio
Automatic Analysis of Critical Sections for Efficient Secure Multi-Execution
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
Noninterference Enforcement
Switches
static code analysis
static analysis
Semantics
security of data
security
resource requirements
Resiliency
resilience
reachability analysis
pubcrawl
program testing
Security Policies Analysis
Multi Execution
Monitoring
manual binary analysis
Lattices
hypersafety security policies
Human behavior
fully automatic critical section analysis
demand-driven secure multiexecution
DDSME
composability
Binary Analysis
biblio
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
search problems
program assemblers
pubcrawl
Representation-Learning
resilience
Resiliency
reverse engineering
robust clone search engine
robust vector representation
search engines
optimizations
Semantics
Software
static code analysis
static representation robustness
Static-Analysis
Syntactics
vector representation
Vectors
Vulnerability-Search
dynamic clone search approaches
assembly clone search engine
assembly code representation learning model
assembly function
binary clone search
Binary-Code-Search
Cloning
code obfuscation techniques
compiler optimization options
composability
Asm2Vec
feature engineering process
Human behavior
invasive software
learning (artificial intelligence)
lexical semantic relationships
malware
optimising compilers
optimization
biblio
Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
static analysis challenge
program compilers
program diagnostics
pubcrawl
resilience
Resiliency
security of data
Semantics
Software
static analysis
program behavioral problems
static code analysis
static detection
static vulnerability detection
static vulnerability detectors
Training
vulnerabilities
vulnerability detection
vulnerable program
graph embedding
composability
Computer bugs
Compositionality
control-flow
control-flow-related vulnerabilities
Convolutional codes
feature extraction
general static analysis solutions
graph convolutional network
CFR vulnerabilities
graph embedding approach
graph theory
high-level control-flow information
high-level control-flow related vulnerabilities
Human behavior
learning (artificial intelligence)
machine-learning-based approaches
program analysis
biblio
Spam Mail Detection and Prevention at Server Side
Submitted by grigby1 on Mon, 02/10/2020 - 11:19am
classification
collaborative filtering
Human behavior
Human Factors
Metrics
pubcrawl
Scalability
Semantics
spam
spam detection
biblio
Computational Stylometry and Machine Learning for Gender and Age Detection in Cyberbullying Texts
Submitted by grigby1 on Mon, 01/27/2020 - 12:29pm
Age Detection
Computational Stylometry
Cyberbullying Detection
feature extraction
Gender Detection
Human behavior
Human Factors
Linguistics
machine learning
Metrics
psychology
pubcrawl
Semantics
Social network services
stylometry
taxonomy
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »