Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
source code
biblio
Towards a TRansparent I/O Solution
Submitted by
aekwall
on Mon, 06/01/2020 - 9:49am
application behaviors
complex storage solutions
composability
cost reduction
custom code
data distribution
data lands
encryption
graph chain
In transit engine
in-transit processing
infrastructure level
infrastructure setup
infrastructure-related changes
Libraries
Logic gates
management code
metadata
middleware
middleware security
policy-based governance
preceding graph
pubcrawl
Regulated I/O
resilience
Resiliency
reusable components
security
security of data
Semantics
software reusability
source code
source code (software)
storage back-end
storage platforms
Strips
Transparent I/O
transparent I/O solution
Web service scenario security
web services
workload diversity
biblio
Applying Convolutional Neural Network for Malware Detection
Submitted by
grigby1
on Mon, 04/06/2020 - 1:24pm
binary code analysis
composability
computer network security
convolutional neural nets
convolutional neural networks
Convolutional Neural Networks (CNN)
cyber physical systems
deep learning
feature extraction
internet
invasive software
knowledge based systems
learning (artificial intelligence)
machine learning
malware
malware detection
malware detection efficiency
malware renders conventional detection techniques
Metrics
network administrators
network coding
Personnel
Predictive models
pubcrawl
resilience
Resiliency
source code
Source code analysis
testing
Training
biblio
Cross-Entropy: A New Metric for Software Defect Prediction
Submitted by
grigby1
on Tue, 11/12/2019 - 3:26pm
code metric
code naturalness
Computer bugs
cross-entropy
deep learning
DefectLearner
Entropy
language model
Measurement
Metrics
natural language processing
Predictive models
predictive security metrics
program debugging
pubcrawl
recurrent neural nets
recurrent neural network language model
Semantics
Software
software bugs
software defect prediction
software metrics
software quality
software quality assurance
software repository
source code
source code (software)
Task Analysis
biblio
Source Code Authorship Approaches Natural Language Processing
Submitted by
grigby1
on Fri, 02/22/2019 - 3:02pm
authorship attribution
deep learning
Human behavior
machine learning
Metrics
natural language processing
NLP
pubcrawl
source code
stylometry
biblio
Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms
Submitted by
grigby1
on Thu, 02/14/2019 - 10:19am
cache storage
cache-timing attacks
cache-timing vulnerabilities
composability
cryptographic algorithms
dedicated vulnerability research tool
development cycle
encryption
execution behavior
leakage pattern detection
Metrics
NIST
NIST post-quantum cryptography project submissions
NIST post-quantum standardization project
post-quantum cryptography algorithms
program diagnostics
Proposals
pubcrawl
quantum cryptography
source code
static analysis
taint analysis
tools
validation tools
biblio
Hybrid Encryption for Securing SharedPreferences of Android Applications
Submitted by
grigby1
on Thu, 01/31/2019 - 11:16am
android
Android (operating system)
Android applications
android encryption
Android Keystore system
Android operating system
Androids
confidential information
Cryptography
encryption
encryption algorithm
Human behavior
Human Factors
Humanoid robots
hybrid encryption approach
internal memory
Keystore
Metrics
Mobile Applications
password
pubcrawl
resilience
Resiliency
Scalability
Shared Preference interface
SharedPreferences
smart phones
source code
source code (software)
XML
biblio
The approach to finding errors in program code based on static analysis methodology
Submitted by
grigby1
on Thu, 06/07/2018 - 2:12pm
Bars
composability
diagnostic rules
efficiency improvement
embedded computing
Human behavior
increase of efficiency
program code Error detection
program diagnostics
pubcrawl
resilience
Resiliency
semantic information
Semantics
software quality
source code
source code (software)
static code analysis
static code analysis methodology
static program code analysis
syntactic information
Syntactics
syntax tree
testing
tools
biblio
HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security
Submitted by
grigby1
on Mon, 04/02/2018 - 11:33am
Android (operating system)
Android API
Android API call traces
Android applications
Androids
API call trace generation
APIs
application program interfaces
application services
Compositionality
dynamic analysis
Humanoid robots
hybrid approach
HyDroid
Java
malware
mobile computing
Mobile Security
obfuscated Android applications
program diagnostics
pubcrawl
reflection
Registers
Repackaging
resilience
Resiliency
security
security of data
security threats
source code
static analysis
Static and Dynamic Analysis of Apps
biblio
Evaluating micro patterns and software metrics in vulnerability prediction
Submitted by
grigby1
on Thu, 12/28/2017 - 12:30pm
Apache Camel
Apache Tomcat
class-level patterns
class-level traceable patterns
Complexity theory
cost effective software testing
Design patterns
early detection
internet
Java
learning (artificial intelligence)
machine learning techniques
Metrics
micropatterns evaluation
Object oriented modeling
Predictive Metrics
Predictive models
predictive security metrics
program testing
pubcrawl
security
security of data
security vulnerabilities
Software
software metrics
software quality
software security
source code
source code (software)
stand-alone Java web applications
time effective software testing
traditional class-level software metrics
traditional software metrics
vulnerability prediction model
vulnerable classes
vulnerable code
biblio
XSSDM: Towards detection and mitigation of cross-site scripting vulnerabilities in web applications
Submitted by
grigby1
on Tue, 03/07/2017 - 12:31pm
Computer crime
Context
Context Sensitive
context-sensitive approach
Cross-site scripting (XSS)
cross-site scripting vulnerability detection
cyber crime
HTML
internet
pattern matching
pattern matching technique
program diagnostics
pubcrawl170109
Reactive power
security
security vulnerability
Sensitivity
Servers
source code
source code (software)
standards
static analysis
static taint analysis
Web application
Web Application Security
XSSDM
1
2
next ›
last »