[PDF][PDF] Collaboro: a collaborative (meta) modeling tool
JLC Izquierdo, J Cabot - PeerJ Computer Science, 2016 - peerj.com
Motivation Scientists increasingly rely on intelligent information systems to help them in their
daily tasks, in particular for managing research objects, like publications or datasets. The …
daily tasks, in particular for managing research objects, like publications or datasets. The …
On the techniques we create, the tools we build, and their misalignments: A study of KLEE
Our community constantly pushes the state-of-the-art by introducing" new" techniques.
These techniques often build on top of, and are compared against, existing systems that …
These techniques often build on top of, and are compared against, existing systems that …
An experimental approach for estimating cyber risk: a proposal building upon cyber ranges and capture the flags
Current approaches to estimate the risk of compromise are based on either historical data or
pure technical assessments, such as the number and severity of vulnerabilities in the target …
pure technical assessments, such as the number and severity of vulnerabilities in the target …
An efficient vulnerability extrapolation using similarity of graph kernel of pdgs
J Zeng, X Nie, L Chen, J Li, G Du… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Discovering the potential vulnerabilities in software plays a crucial role in ensuring the
security of computer system. This paper proposes a method that can assist security auditors …
security of computer system. This paper proposes a method that can assist security auditors …
TestREx: a framework for repeatable exploits
Web applications are the target of many well-known exploits and also a fertile ground for the
discovery of security vulnerabilities. Yet, the success of an exploit depends both on the …
discovery of security vulnerabilities. Yet, the success of an exploit depends both on the …
Enhancing the quality of information supporting the cyber risk management process in self-protecting systems
M Cuoci - 2024 - tesidottorato.depositolegale.it
Abstract The Cyber Risk Management process relies on multiple sources of information,
some of which derive from the monitored environment, some of which is stored in external …
some of which derive from the monitored environment, some of which is stored in external …
Smart brix—a continuous evolution framework for container application deployments
Container-based application deployments have received significant attention in recent
years. Operating system virtualization based on containers as a mechanism to deploy and …
years. Operating system virtualization based on containers as a mechanism to deploy and …
Development of dynamic protection against timing channels
S Kananizadeh, K Kononenko - International Journal of Information …, 2017 - Springer
Abstract Information systems face many threats, such as covert channels, which declassify
hidden information by, eg, analyzing the program execution time. Such threats exist at …
hidden information by, eg, analyzing the program execution time. Such threats exist at …
An approach to error correction in program code using dynamic optimization in a virtual execution environment
K Kononenko - The Journal of Supercomputing, 2016 - Springer
Program code is at risk from a wide range of attack vectors that appear at various stages
during the compilation and execution of machine code. The existing approaches for …
during the compilation and execution of machine code. The existing approaches for …
Engineering and management of heterogenous smart city application ecosystems
JM Schleicher - 2017 - repositum.tuwien.at
The recent advent and rapid success of the smart city paradigm has led to its widespread
adoption in cities and their supporting ecosystems around the globe. Spear headed by …
adoption in cities and their supporting ecosystems around the globe. Spear headed by …