Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
evaluation
biblio
An Analysis of Utility for API Recommendation: Do the Matched Results Have the Same Efforts?
Submitted by grigby1 on Wed, 01/20/2021 - 4:22pm
API
API Recommendation
APIs
application programming interface
Compositionality
Conferences
correctness
Current measurement
evaluation
programming
pubcrawl
Reliability engineering
resilience
Resiliency
security
software quality
software reliability
term frequency
utility
biblio
BenchPress: Analyzing Android App Vulnerability Benchmark Suites
Submitted by grigby1 on Fri, 08/14/2020 - 11:43am
security of data
security
pubcrawl
resilience
Resiliency
mobile computing
APIs
application program interfaces
Compositionality
android
evaluation
Android (operating system)
Android app development
Android app vulnerability benchmark suite analysis
Android security analysis tools
Android-specific benchmark suites
benchmark
BenchPress
DroidBench
Empirical Software Engineering
Ghera
ICCBench
Representativeness
security-related APIs
stack overflow
temperature 227.0 K
tool developers
UBCBench
application programming interface
biblio
Analytical Evaluation of k–Anonymity Algorithm and Epsilon-Differential Privacy Mechanism in Cloud Computing Environment
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
algorithm orientation
algorithm orientations
analytical evaluation
anonymity
anonymity algorithm
Cloud Computing
cloud computing environment
composability
data analysis
Data models
data privacy
Data Security
data segregation
Databases
differential privacy
differential privacy algorithm
differential privacy mechanism
dilemmas
epsilon-differential privacy mechanism
evaluation
expected risks
Human behavior
k-anonymity algorithm
Metrics
privacy
privacy environment
privacy problem
privacy protection algorithms
pubcrawl
resilience
Resiliency
Runtime
security of data
unexpected risks
biblio
Research on Computer Network Security Evaluation Method Based on Levenberg-Marquardt Algorithms
Submitted by grigby1 on Fri, 05/08/2020 - 2:42pm
Training
security
Neural networks
pubcrawl
policy-based governance
collaboration
computer network security
Indexes
Safety
Communication networks
neural nets
Metrics
Backpropagation
BP Neural Network
computer networks
computer network security evaluation method
evaluation
Levenberg-Marquardt algorithms
LM-BP algorithm
local minimum point
training process
Neural Network Security
biblio
Research of Computer Network Security Evaluation Based on Backpropagation Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:42pm
security
pubcrawl
policy-based governance
collaboration
computer network security
Indexes
Mathematical model
Communication networks
neural nets
Metrics
Biological neural networks
Backpropagation
backpropagation neural network
BP Neural Network
computer network security evaluation
computer networks
computer viruses
evaluation
loopholes
prediction
Virus
Neural Network Security
biblio
Evaluation of SQL Injection Prevention Methods
Submitted by grigby1 on Mon, 02/10/2020 - 11:25am
collaboration
evaluation
Human behavior
internet
Metrics
policy-based governance
privacy
pubcrawl
resilience
Resiliency
security of data
SQL
SQL detection
SQL injection
SQL injection issue
SQL injection prevention
SQL Injection Prevention Methods
web applications
web services
websites
biblio
Engineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
security of data
Trusted Computing
pubcrawl
composability
graph theory
Computational modeling
Metrics
Vulnerability
systems engineering
trust
Measurement
Trust management
evaluation
Risk
modeling
psychology
cognition
Compositionality
complex intersystem trust relationships
complex multitiered system architectures
Component architectures
disparate system
engineering trust
graph-based algorithm
graph-based modeling methodology
requirements analysis
System Engineering
Systems architecture
systems engineering processes
trust modeling
Computing Theory and Trust
biblio
Automatically Validating the Effectiveness of Software Diversity Schemes
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
security of data
Scalability
Program processors
Resiliency
pubcrawl
Metrics
vulnerabilities
Cybersecurity
computer security
Measurement
evaluation
Semantics
Compositionality
program compilers
compilers
comparative evaluation
DARPA Cyber Grand Challenge environment
diversifying compiler
diversity strategies
diversity techniques
exploit mitigation
scant attention
software diversity
software diversity schemes
software protection
compiler security
biblio
Deepsecure: Scalable Provably-secure Deep Learning
Submitted by aekwall on Mon, 06/17/2019 - 10:28am
pubcrawl
composability
evaluation
automated design
garbled circuit
logic synthesis
privacy-preserving deep learning
secure function
security scalability
biblio
Cloud Service Risk in the Smart Grid
Submitted by aekwall on Mon, 03/18/2019 - 9:54am
computational intelligence
usiness
Cloud Computing
cloud service
cloud service risk
cost-effective power management
evaluation
general technical risks
index system
Indexes
Metrics
multilayered index system
power engineering computing
pubcrawl
Resiliency
Risk
Scalability
security
security of data
security risk
Smart Grid
smart grid security
Smart Grids
smart power grids
Virtual machining
1
2
3
next ›
last »