[PDF][PDF] Collaboro: a collaborative (meta) modeling tool

JLC Izquierdo, J Cabot - PeerJ Computer Science, 2016 - peerj.com
Motivation Scientists increasingly rely on intelligent information systems to help them in their
daily tasks, in particular for managing research objects, like publications or datasets. The …

On the techniques we create, the tools we build, and their misalignments: A study of KLEE

EF Rizzi, S Elbaum, MB Dwyer - … of the 38th International Conference on …, 2016 - dl.acm.org
Our community constantly pushes the state-of-the-art by introducing" new" techniques.
These techniques often build on top of, and are compared against, existing systems that …

An experimental approach for estimating cyber risk: a proposal building upon cyber ranges and capture the flags

G Di Tizio, F Massacci, L Allodi… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Current approaches to estimate the risk of compromise are based on either historical data or
pure technical assessments, such as the number and severity of vulnerabilities in the target …

An efficient vulnerability extrapolation using similarity of graph kernel of pdgs

J Zeng, X Nie, L Chen, J Li, G Du… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Discovering the potential vulnerabilities in software plays a crucial role in ensuring the
security of computer system. This paper proposes a method that can assist security auditors …

TestREx: a framework for repeatable exploits

S Dashevskyi, DR Dos Santos, F Massacci… - International Journal on …, 2019 - Springer
Web applications are the target of many well-known exploits and also a fertile ground for the
discovery of security vulnerabilities. Yet, the success of an exploit depends both on the …

Enhancing the quality of information supporting the cyber risk management process in self-protecting systems

M Cuoci - 2024 - tesidottorato.depositolegale.it
Abstract The Cyber Risk Management process relies on multiple sources of information,
some of which derive from the monitored environment, some of which is stored in external …

Smart brix—a continuous evolution framework for container application deployments

JM Schleicher, M Vögler, C Inzinger… - PeerJ Computer …, 2016 - peerj.com
Container-based application deployments have received significant attention in recent
years. Operating system virtualization based on containers as a mechanism to deploy and …

Development of dynamic protection against timing channels

S Kananizadeh, K Kononenko - International Journal of Information …, 2017 - Springer
Abstract Information systems face many threats, such as covert channels, which declassify
hidden information by, eg, analyzing the program execution time. Such threats exist at …

An approach to error correction in program code using dynamic optimization in a virtual execution environment

K Kononenko - The Journal of Supercomputing, 2016 - Springer
Program code is at risk from a wide range of attack vectors that appear at various stages
during the compilation and execution of machine code. The existing approaches for …

Engineering and management of heterogenous smart city application ecosystems

JM Schleicher - 2017 - repositum.tuwien.at
The recent advent and rapid success of the smart city paradigm has led to its widespread
adoption in cities and their supporting ecosystems around the globe. Spear headed by …