Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Semantics
biblio
SCTD: Smart Reasoning Based Content Threat Defense in Semantics Knowledge Enhanced ICN
Submitted by grigby1 on Tue, 01/21/2020 - 11:27am
security of data
internet
knowledge graph
pubcrawl
resilience
Resiliency
Scalability
SCTD
security knowledge-based defense mechanism
information-centric networking
semantic obfuscation
semantic reasoning
semantic relations
Semantics
smart based defense mechanism
smart reasoning algorithms
smart reasoning based content threat defense
subscription-based naming mechanism
Extranets
cognition
computer architecture
content semantic awareness
content threats
content-based defense mechanism
context communication content
distributed processing
edge computing
blacklisting
fog computing based defense mechanism
ICN edge defense system
ICN protocols
ICN semantic features
inference mechanisms
Information Centric Network
Information Centric Networks
biblio
Automatically Validating the Effectiveness of Software Diversity Schemes
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
program compilers
compiler security
software protection
software diversity schemes
software diversity
scant attention
exploit mitigation
diversity techniques
diversity strategies
diversifying compiler
DARPA Cyber Grand Challenge environment
comparative evaluation
compilers
security of data
Compositionality
Semantics
evaluation
Measurement
computer security
Cybersecurity
vulnerabilities
Metrics
pubcrawl
Resiliency
Program processors
Scalability
biblio
Information-Flow Preservation in Compiler Optimisations
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
Scalability
optimization
passive side-channel attacks
program optimisations
Program processors
program transformations
program verification
pubcrawl
Resiliency
optimising compilers
Semantics
side-channel
side-channel attacks
source program
standard compiler passes
standards
target program
I-O Systems
Micromechanical devices
Metrics
information-flow preserving program transformation
information-flow preservation
information-flow leaks
Information Flow
IFP
correct compilers
Compositionality
compiler security
compiler optimisations
compiler
CompCert C compiler
security
i-o systems security
biblio
Understand Code Style: Efficient CNN-Based Compiler Optimization Recognition System
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
recurrent neural nets
compiler security
understand code style
RNN-based model
optimising compilers
compiler optimization algorithms
CNN-based compiler optimization recognition system
CNN-based compiler optimization level recognition model
closed source compilers
binary security analysis
binary file processing
Compositionality
Semantics
security of data
convolution
Analytical models
convolutional neural nets
optimization
Metrics
pubcrawl
Resiliency
Task Analysis
Software
security
Scalability
biblio
Cross-Entropy: A New Metric for Software Defect Prediction
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
pubcrawl
Task Analysis
source code (software)
source code
software repository
software quality assurance
software quality
software metrics
software defect prediction
software bugs
Software
Semantics
recurrent neural network language model
recurrent neural nets
code metric
program debugging
predictive security metrics
Predictive models
natural language processing
Metrics
Measurement
language model
Entropy
DefectLearner
deep learning
cross-entropy
Computer bugs
code naturalness
biblio
Protecting Privacy with a Declarative Policy Framework
Submitted by aekwall on Mon, 11/11/2019 - 11:47am
privacy policy framework
formal verification
Human behavior
Ontologies
policy decision point
privacy
privacy enhancing technologies
Privacy Policies
privacy policy creation
privacy policy decision engine
privacy policy engine decisions
Formal Specification
privacy policy management
privacy policy validation
privacy protection
pubcrawl
Scalability
security of data
Semantics
technical details
user interfaces
Common Data Model
Resiliency
-Automated-reasoning
-Data-sharing
-Ontology
-Policy
-Policy-Decision-Engine
-Privacy-Framework
-Reasoning
-Rule
-Semantic-Technology
Computing Theory and Privacy
Cryptography
Data models
data privacy
Databases
declarative policy framework
Engines
enterprise privacy prototype system
expressive policy specification
formal shareability theory
biblio
Semantics-Directed Prototyping of Hardware Runtime Monitors
Submitted by grigby1 on Mon, 11/04/2019 - 12:35pm
ROP-style code reuse attacks
Monitoring
multiple memory accesses
pubcrawl
rapid-prototyping runtime monitors
reconfigurable architectures
resilience
Resiliency
rop attacks
Model driven development
Runtime
Scalability
security of data
Semantics
semantics-directed prototyping
software monitor
software-based attacks
Biomedical monitoring
Instruction sets
Human Factors
Human behavior
high level synthesis
hardware-based protection
Hardware Security
hardware runtime monitors
hardware monitor
Hardware
formal verification
embedded systems
embedded processor
embedded hardware
composability
building memory protection mechanisms
biblio
From Big Data to Knowledge: Issues of Provenance, Trust, and Scientific Computing Integrity
Submitted by aekwall on Mon, 10/28/2019 - 10:39am
provenance-based trust reasoning
data science
Data validity
data-intensive science and engineering
Knowledge engineering
knowledge provenance
malicious attacks
natural environmental changes
operations mistakes
cognitive systems
SCI failures
scientific computing integrity
scientific workflows
Variety
Veracity
Viewpoints
views
Scientific Computing Security
trust
Big Data
Conferences
data integrity
Trusted Computing
Resiliency
pubcrawl
graph theory
Computational modeling
security of data
provenance graphs
cognition
Semantics
inference mechanisms
Predictive Metrics
data provenance
scientific information systems
Compositionality
biblio
Efficient and Safe Control Flow Recovery Using a Restricted Intermediate Language
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
security
program diagnostics
program verification
pubcrawl
resilience
Resiliency
restricted control transition intermediate language
Safe Coding
safe control flow recovery
program compilers
security mechanisms
security of data
security policies
Security Validation
Semantics
software fault tolerance
source code level
Explosions
Bianry Analysis
collaboration
Computational modeling
Conferences
Control Flow Recovery
control-flow recovery
data flow analysis
data-flow analyses
automatic analysis
Formal Specification
Human behavior
Human Factors
low-level object code
Memory management
Metrics
policy-based governance
biblio
Safe Automated Refactoring for Intelligent Parallelization of Java 8 Streams
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
semantics-preserving fashion
policy-based governance
pubcrawl
Refactoring
resilience
Resiliency
running operations
safe automated refactoring
Safe Coding
Semantics
Pipelines
sequential streams
software maintenance
static analysis
Stream API
stream code
stream operations
streams
typestate analysis
Writing
Instruction sets
automated refactoring approach
automatic parallelization
collaboration
data structures
finite data structures
Human behavior
Human Factors
Image color analysis
infinite data structures
application program interfaces
intelligent parallelization
Java
Java 8
lambda expression side-effects
mainstream object-oriented programming languages
MapReduce-style operations
Metrics
optimizing stream code
parallel streams
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »