Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
vulnerability detection
biblio
Vulnerability assessment and detection of Deepfake videos
Submitted by grigby1 on Fri, 01/15/2021 - 11:12am
learning (artificial intelligence)
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
neural nets
public domain software
Metrics
face recognition
vulnerability assessment
vulnerability detection
gan
video signal processing
DeepFake
deepfake video detection
face recognition systems
Facenet neural networks
Open Source Software
pre-trained generative adversarial network
VGG
VidTIMIT database
biblio
Beware of the Vulnerability! How Vulnerable are GitHub's Most Popular PHP Applications?
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
Scalability
data integrity
security
Resiliency
Human behavior
pubcrawl
tools
software engineering
static analysis
Computer bugs
statistical analysis
software security
vulnerability detection
Computers
cross-site scripting
XSS
Open Source Software
software vulnerabilities
CVSS
critical vulnerabilities
GitHub
injection vulnerabilities
open source
open source PHP applications
open source project owners
open source projects
PHP
project popularity
RIPS
scanning
software project
Software Vulnerability
static analysis vulnerability scanner
vulnerable project
Cross Site Scripting
biblio
SWAN\_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods
Submitted by aekwall on Mon, 09/28/2020 - 10:33am
security
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
vulnerability detection
Training
Libraries
machine learning
authentication
public domain software
software maintenance
Automated Secure Software Engineering
Java
program diagnostics
software quality
program debugging
software metrics
graphical user interfaces
machine-learning
active machine learning
authentication methods
bug detection
code-specific methods
IntelliJ plugin
novel automated machine-learning approach SWAN
program analysis
security-relevant methods
semiautomated detection
SRM
static analysis tools
SWAN\_ASSIST aids developers
SWAN\_ASSIST tool
time exactly those methods whose classification best impact
biblio
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things
Submitted by aekwall on Mon, 09/21/2020 - 2:35pm
security of data
Internet of Things
IoT devices
Internet of Things (IoT)
Resiliency
pubcrawl
graph theory
Protocols
Vulnerability Analysis
Decision Making
Intrusion Detection
firmware
IoT security
vulnerability detection
cyber security
security issues
IoT systems
attack graph
Internet-of-Things devices
model checking
network protocols
composability
catastrophic accidents
corresponding graph-based analysis
cross-layer formal framework
cross-layer vulnerability detection framework
design flaws
device firmware
ForeSee
high-level decision-making processes
IoT privacy
long sequence
low-level physical surroundings
Multiple layer
multiple layers
physical environment
potential attack paths
severe threats
system configurations
Cross Layer Security
biblio
Hardening the Core: Understanding and Detection of XNU Kernel Vulnerabilities
Submitted by aekwall on Mon, 07/27/2020 - 11:20am
security of data
security
Kernel
Resiliency
pubcrawl
Metrics
vulnerability detection
security vulnerabilities
Engines
Human Factors
Instruments
empirical study
Compositionality
fuzzing
operating system kernels
Manuals
statistical analysis
common application vulnerabilities
feedback based fuzzing
feedback-based fuzzing techniques
KInspector framework
macOS/iOS kernel XNU
XNU kernel vulnerabilities
XNU kernel vulnerability
iOS Security
biblio
DifFuzz: Differential Fuzzing for Side-Channel Analysis
Submitted by aekwall on Mon, 03/09/2020 - 10:13am
security of data
Scalability
Cryptography
Resiliency
pubcrawl
vulnerability detection
tools
Correlation
Java
program diagnostics
execution time
Instruments
Time factors
side-channel
fuzzing
dynamic analysis
side-channel analysis
side-channel attacks
differential fuzzing
DifFuzz
fuzzing-based approach
Java programs
Performance analysis
resource consumption
resource usage
resource-guided heuristics
secret program data
secret-dependent paths
unknown side-channel vulnerabilities
Security Heuristics
predictability
biblio
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS
Submitted by aekwall on Mon, 02/17/2020 - 1:42pm
security of data
security
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
vulnerability detection
Databases
Training
machine learning
Computer bugs
public domain software
software development management
software maintenance
Compositionality
Open Source Software
security patch
0-day attacks
0-day vulnerability
armored attackers
BoringSSL
easy software development management
n-day attacks
secret security patches
secretly patched vulnerabilities
security fixes
security patch database
security patches mapping
software vendors
unpatched OSS versions
vulnerable code public
biblio
A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks
Submitted by aekwall on Mon, 02/17/2020 - 1:42pm
Intrusion Detection
security of data
telecommunication traffic
Internet of Things
Protocols
nearest neighbour methods
feature extraction
machine learning
Resiliency
Human behavior
pubcrawl
Metrics
pattern classification
vulnerabilities
Training
Cybersecurity
Anomaly Detection
network traffic
vulnerability detection
Compositionality
IoT networks
anomaly detection system
CICIDS2017 dataset
edited nearest neighbors
flow-based anomaly detection
flow-based features extraction
flow-based intrusion detection
level-1 model
level-2 model precision
malicious activity detection
recursive feature elimination
sampling methods
synthetic minority over-sampling technique
two-level hybrid anomalous activity detection
UNSW-15 dataset
biblio
Algebraic Patterns of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 1:42pm
Buffer overflows
Resiliency
Human behavior
pubcrawl
Metrics
vulnerability detection
pattern matching
program diagnostics
algebra
Semantics
Compositionality
Registers
sockets
binary code
Binary codes
algebra equations
algebraic approach
algebraic matching
algebraic matching methods
algebraic patterns
behaviour algebra
cyber reasoning systems
pattern creation
rewriting rules
symbolic modelling
biblio
Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis
Submitted by aekwall on Mon, 02/17/2020 - 1:42pm
security
Software
invasive software
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
machine learning
Metrics
Correlation
Anomaly Detection
Computer bugs
security vulnerabilities
Measurement
vulnerability detection
android
Android (operating system)
Compositionality
anomaly detection techniques
system calls
Android operating systems
Android security vulnerabilities
cyber attackers
detection algorithm
detection process
malicious Android application
security bugs
security vulnerabilities detection
system call
vulnerabilities detection approach
1
2
3
4
5
6
next ›
last »