Zobrazeno 1 - 10
of 39
pro vyhledávání: '"Walenstein, Andrew"'
Software vulnerabilities are a challenge in cybersecurity. Manual security patches are often difficult and slow to be deployed, while new vulnerabilities are created. Binary code vulnerability detection is less studied and more complex compared to so
Externí odkaz:
http://arxiv.org/abs/2404.08562
We propose a novel framework for designing a resilient Model Predictive Control (MPC) targeting uncertain linear systems under cyber attack. Assuming a periodic attack scenario, we model the system under Denial of Service (DoS) attack, also with meas
Externí odkaz:
http://arxiv.org/abs/2310.08680
Autor:
Liu, Jinxin, Simsek, Murat, Kantarci, Burak, Erol-Kantarci, Melike, Malton, Andrew, Walenstein, Andrew
Access to resources by users may need to be granted only upon certain conditions and contexts, perhaps particularly in cyber-physical settings. Unfortunately, creating and modifying context-sensitive access control solutions in dynamic environments c
Externí odkaz:
http://arxiv.org/abs/2108.12739
Autor:
Yao, Kundi, Oliva, Gustavo A., Hassan, Ahmed E., Asaduzzaman, Muhammad, Malton, Andrew J., Walenstein, Andrew
Publikováno v:
In The Journal of Systems & Software July 2023 201
Publikováno v:
Journal of Computer Virology and Hacking Techniques; 20240101, Issue: Preprints p1-16, 16p
Autor:
Liu, Jinxin, Simsek, Murat, Kantarci, Burak, Erol-kantarci, Melike, Malton, Andrew, Walenstein, Andrew
Publikováno v:
Digital Threats: Research & Practice; Dec2022, Vol. 3 Issue 4, p1-29, 29p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
From 23.07.06 to 26.07.06, the Dagstuhl Seminar 06301 ``Duplication, Redundancy, and Similarity in Software'' was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6444d6b18f2d3ce10eed0b0c9a5aa26f
Code "clones" are similar segments of code that are frequently introduced by "scavenging" existing code, that is, reusing code by copying it and adapting it for a new use. In order to scavenge the code, the developer must be aware of it already, or m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d122586fbca49b32892a618fdf1bf274
Autor:
Walenstein, Andrew, Cordy, James R., Evans, William S., Hassan, Ahmed, Kamiya, Toshihiro, Kapser, Cory, Merlo, Ettore
This report summarizes the proceedings of a workshop discussion session presentation and visualization of aspects relating to duplicated, copied, or cloned code. The main outcomes of the working session were: (a) a realization that two researchers ha
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::49dd29f4f7e4ea5b7caf303e4e9db864