Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
source code
biblio
Software Source Code Security Audit Algorithm Supporting Incremental Checking
Submitted by grigby1 on Fri, 01/13/2023 - 12:47pm
security
pubcrawl
Human behavior
resilience
Resiliency
Software
Scalability
Computer bugs
Software algorithms
source coding
Software Testing
codes
Security Audits
source code
Incremental Checking
security audit
biblio
Machine Learning Approaches for Authorship Attribution using Source Code Stylometry
Submitted by grigby1 on Fri, 09/09/2022 - 1:27pm
deep learning
feature extraction
machine learning
pubcrawl
Human behavior
Metrics
Conferences
Big Data
Syntactics
natural language processing
stylometry
codes
authorship attribution
source code
biblio
Predicting Security Vulnerabilities using Source Code Metrics
Submitted by aekwall on Fri, 07/29/2022 - 3:27pm
Prediction algorithms
object oriented security
source code
security vulnerabilities
software metrics
Object oriented modeling
codes
prediction
supervised learning
security
composability
Resiliency
Metrics
pubcrawl
machine learning algorithms
machine learning
Measurement
biblio
Semantic Understanding of Source and Binary Code based on Natural Language Processing
Submitted by grigby1 on Thu, 03/10/2022 - 11:32am
Training
pubcrawl
Human behavior
resilience
Resiliency
Scalability
process control
natural language processing
Semantics
Syntactics
Binary codes
Transforms
binary code
LLVM IR
semantic understanding
source code
biblio
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries
Submitted by aekwall on Thu, 04/08/2021 - 3:34pm
rewriting systems
system-level security facilities
rewriting-based randomization
quantitative assessment
legacy software systems
legacy software
legacy binaries
fine-grained randomization tools
code-reuse attacks
Binary Rewriting
advanced security attacks
Information Reuse and Security
security of data
source code
Binary codes
code-reuse attack
fine-grained code randomization
code randomization
Compositionality
software maintenance
risk assessment
pubcrawl
Resiliency
biblio
Improving Fuzzing through Controlled Compilation
Submitted by aekwall on Mon, 03/15/2021 - 11:09am
beneficial compiler optimizations
standard compilers
rigorous evaluation methodology
qualitative coverage
program line
LLVM
Intermediate Representation
grey-box fuzzers
fuzzing strategy
fuzzing consistency
current coverage-based evaluation measures
coverage metrics
coverage mesaures
coverage
controlled compilation
concolic fuzzers
security of data
AFL's configuration
AFL
open source projects
source code
fuzzing
compiler security
program compilers
Compositionality
fuzzy set theory
program testing
Metrics
pubcrawl
Resiliency
Scalability
biblio
Towards a TRansparent I/O Solution
Submitted by aekwall on Mon, 06/01/2020 - 9:49am
source code
preceding graph
pubcrawl
Regulated I/O
resilience
Resiliency
reusable components
security
security of data
Semantics
software reusability
policy-based governance
source code (software)
storage back-end
storage platforms
Strips
Transparent I/O
transparent I/O solution
Web service scenario security
web services
workload diversity
in-transit processing
complex storage solutions
composability
cost reduction
custom code
data distribution
data lands
encryption
graph chain
In transit engine
application behaviors
infrastructure level
infrastructure setup
infrastructure-related changes
Libraries
Logic gates
management code
metadata
middleware
middleware security
biblio
Applying Convolutional Neural Network for Malware Detection
Submitted by grigby1 on Mon, 04/06/2020 - 1:24pm
malware detection
Training
testing
Source code analysis
source code
Resiliency
resilience
pubcrawl
Predictive models
Personnel
network coding
network administrators
Metrics
malware renders conventional detection techniques
malware detection efficiency
binary code analysis
malware
machine learning
learning (artificial intelligence)
knowledge based systems
invasive software
internet
feature extraction
deep learning
cyber physical systems
Convolutional Neural Networks (CNN)
convolutional neural networks
convolutional neural nets
computer network security
composability
biblio
Cross-Entropy: A New Metric for Software Defect Prediction
Submitted by grigby1 on Tue, 11/12/2019 - 3:26pm
pubcrawl
Task Analysis
source code (software)
source code
software repository
software quality assurance
software quality
software metrics
software defect prediction
software bugs
Software
Semantics
recurrent neural network language model
recurrent neural nets
code metric
program debugging
predictive security metrics
Predictive models
natural language processing
Metrics
Measurement
language model
Entropy
DefectLearner
deep learning
cross-entropy
Computer bugs
code naturalness
biblio
Source Code Authorship Approaches Natural Language Processing
Submitted by grigby1 on Fri, 02/22/2019 - 3:02pm
authorship attribution
deep learning
Human behavior
machine learning
Metrics
natural language processing
NLP
pubcrawl
source code
stylometry
1
2
3
next ›
last »