Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
program testing
biblio
Relating the Empirical Foundations of Attack Generation and Vulnerability Discovery
Submitted by aekwall on Thu, 04/08/2021 - 4:34pm
security
malware detection
Data models
Resiliency
pubcrawl
software security
tools
program testing
Analytical models
Data mining
Trojan horses
computer viruses
Payloads
anti-virus
Compositionality
Trojan detection
security auditing
security testing
Information Reuse and Security
antivirus tool
automatic attack generation
automatic exploit generation
information foraging
vulnerability discovery
biblio
Extracting Taint Specifications for JavaScript Libraries
Submitted by grigby1 on Mon, 03/15/2021 - 1:10pm
access path mechanism
authoring languages
command injection attacks
composability
cross-site scripting
dynamic analysis
Entry points
exit points
JavaScript applications
JavaScript libraries
Libraries
Metrics
Node.js platform
npm repository
package dependency structure
program diagnostics
program testing
pubcrawl
resilience
Resiliency
security
security of data
security vulnerabilities
software engineering
static analysis
static analysis tools
taint analysis
taint sinks
taint specifications
test suites
testing
third-party libraries
tools
Writing
biblio
Improving Fuzzing through Controlled Compilation
Submitted by aekwall on Mon, 03/15/2021 - 12:09pm
security of data
Scalability
Resiliency
pubcrawl
Metrics
program testing
fuzzy set theory
Compositionality
program compilers
compiler security
fuzzing
source code
open source projects
AFL
AFL's configuration
beneficial compiler optimizations
concolic fuzzers
controlled compilation
coverage
coverage mesaures
coverage metrics
current coverage-based evaluation measures
fuzzing consistency
fuzzing strategy
grey-box fuzzers
Intermediate Representation
LLVM
program line
qualitative coverage
rigorous evaluation methodology
standard compilers
biblio
Hybrid Deep Neural Networks to Infer State Models of Black-Box Systems
Submitted by aekwall on Tue, 03/09/2021 - 12:04pm
Task Analysis
Time measurement
Classification algorithms
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Metrics
neural nets
pattern classification
program testing
testing
Anomaly Detection
software engineering
black box encryption
aerospace computing
deep learning
Instruments
inference mechanisms
time series
convolutional neural network
Time series analysis
recurrent neural network
convolutional layers
888 random recent system-level test cases
automated software engineering tasks
Black-box Model Inference
black-box systems
black-box techniques
black-box third-party libraries
C code
detection techniques
entire source code
existing dynamic model inference techniques
hybrid deep neural network
infer state models
inferred states
inferring behavior model
program comprehension
recurrent layers
run-time traces
running software system
Specification Mining
state change points
state classification algorithm
traditional time series change
UAV auto-pilot solution
white-box
biblio
Can We Predict the Quality of Spectrum-based Fault Localization?
Submitted by aekwall on Mon, 03/01/2021 - 4:47pm
Scalability
Electronic mail
Resiliency
pubcrawl
Metrics
tools
program testing
machine learning
Measurement
Complexity theory
Predictive models
program debugging
software metrics
software fault tolerance
Couplings
fault diagnosis
automated fault localization
debugging
dynamic test metrics
dynamic test suite
effective fault localization
fault localization effectiveness
fault localization techniques
fault-related metrics
potential effectiveness
prediction model
spectrum-based fault localization
static test metrics
static test suite
work factor metrics
biblio
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform
Submitted by grigby1 on Wed, 01/20/2021 - 4:22pm
API
API test cases
API unauthorized access vulnerability detection
APIs
application program interfaces
application programming interface
authorisation
cloud API
Cloud Computing
cloud services
Compositionality
data privacy
formal verification
Internet of Things
IoT devices
IoT security
IoT-APIScanner
permission verification
program testing
pubcrawl
resilience
Resiliency
security
Smart homes
Task Analysis
timing
tools
unauthorized access
user privacy
Web API
biblio
Mobile bootloader with security features
Submitted by grigby1 on Tue, 11/17/2020 - 2:40pm
security of data
system logs
pubcrawl
Metrics
Resiliency
Cryptography
information security
composability
mobile computing
smart phones
computer security
software engineering
resilience
operating systems (computers)
program testing
Software Testing
Booting
bootloader
bootloading stage
described problem
device internal storage
excessive information
mobile bootloader
mobile development
modern mobile operating systems
security features
software design
Operating systems security
biblio
Two-Stage Architectures for Resilient Lightweight PUFs
Submitted by aekwall on Mon, 11/16/2020 - 2:59pm
security of data
field programmable gate arrays
Internet of Things
security
invasive software
Resiliency
pubcrawl
machine learning
program testing
Decoding
resilience
reverse engineering
Binary codes
Threshold voltage
Transistors
arbiter PUF
Current Mirror PUF
Differential Comparator PUF
integrated circuit reliability
Maximum likelihood decoding
physical unclonable function (PUF)
Product codes
Resilient Security Architectures
biblio
Cloud-based Labs and Programming Assignments in Networking and Cybersecurity Courses
Submitted by grigby1 on Wed, 11/04/2020 - 2:02pm
Cloud Computing
cloud-based labs
computer aided instruction
computer science education
computer security
course learning objectives
cyber physical systems
cybersecurity course
cybersecurity education
education
educational courses
Hands-On Laboratory
innovate practice
innovative design
Laboratories
learning activities
Network Programming
networking course
privacy
private cloud
program debugging
program testing
programming assignments
programming languages
Programming profession
pubcrawl
public cloud
security of data
Security Programming
Servers
teaching
biblio
Gathering Insights from Teenagers’ Hacking Experience with Authentic Cybersecurity Tools
Submitted by grigby1 on Wed, 11/04/2020 - 2:01pm
active learning
authentic cybersecurity
computer aided instruction
Computer crime
Conferences
cyber physical systems
cybersecurity education
cybersecurity game
cybersecurity tools
education
further education
Games
Hacking
Penetration Testing
privacy
professional game
program testing
pubcrawl
realistic virtual network infrastructure
science-popularizing program
serious games (computing)
tools
1
2
3
4
5
6
7
next ›
last »