Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Servers
biblio
Scaling IPv6 address bindings in support of a moving target defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:14am
moving target defense
UDP requests
UDP echo server
transport protocols
Time factors
statistical improbability
standards
sockets
Servers
security
reconnaissance phase
Peer-to-peer computing
peer to peer scenario
networking
network security research
MT6D
bound interfaces
malicious actor
Local area networks
Kernel
IPv6 moving target defense
IPv6 address space
IPv6 address bindings
IPv6
IP networks
internet
Ethernet interface
computer network security
client-server systems
client server ratio
client server networks
biblio
Effectiveness of Port Hopping as a Moving Target Defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:12am
Analytical models
attacker success likelihood
Computers
moving target defense
network attacks
port hopping
Ports (Computers)
proactive defense
proactive defense technology
Probes
Reconnaissance
reconnaissance attack
security of data
Servers
service identity hiding
urn model
biblio
Web Application Vulnerability Prediction using Hybrid Program Analysis and Machine Learning
Submitted by BrandonB on Tue, 05/05/2015 - 10:55am
Data models
empirical study
HTML
input validation and sanitization
program analysis
security
security measures
Semisupervised learning
Servers
Software
Training
Vulnerability prediction
biblio
Automating Isolation and Least Privilege in Web Services
Submitted by BrandonB on Tue, 05/05/2015 - 10:53am
principle of least privilege
XSS attack
web services
web security
shared-memory-space application
Servers
security policy inference
security of data
security guarantee
security
sandboxed process
Runtime
query results
Prototypes
Browsers
Passe system
Libraries
isolation
HTML5 sandboxing techniques
Django web framework
Databases
database queries
data-flow relationship
cross-site scripting attack
control-flow relationship
client-facing applications
capabilities
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
A context-sensitive approach for precise detection of cross-site scripting vulnerabilities
Submitted by BrandonB on Tue, 05/05/2015 - 10:41am
precise detection
XSS vulnerability
XSS attacks
Web application
vulnerability detection
taint analysis
standards
source code (software)
source code
software development life cycle
Software
social communication
Servers
sensitive information
security
Browsers
malware
malicious user
malicious operation
invasive software
internet
hypermedia markup languages
HTML
health services
financial transaction
defensive programming based HTML context-sensitive approach
cross-site scripting vulnerability
cross-site scripting
Context
biblio
Static analysis approaches to detect SQL injection and cross site scripting vulnerabilities in web applications: A survey
Submitted by BrandonB on Tue, 05/05/2015 - 10:40am
SQLI
social communications
Software
software development life cycle
software maintenance
software reliability
source code
source code (software)
SQL
SQL injection
Servers
static analysi
static analysis
testing
vulnerabilitie
vulnerability detection
web applicatio
web applications
XSS
legacy Web applications
attack prevention
Cross Site Scripting
cross site scripting vulnerabilities
defensive programming
financial transaction
Guidelines
health problem
internet
Analytical models
malicious users
Manuals
program diagnostics
programming
programming mistakes
security of data
security vulnerabilities
security weaknesses
biblio
Datacenter Applications in Virtualized Networks: A Cross-Layer Performance Study
Submitted by BrandonB on Tue, 05/05/2015 - 10:23am
network virtualization
virtualized networks
Virtualization
virtualisation
software-defined networking
software radio
software defined networking overlays
Servers
Protocols
overlay networks
overlay network
Cloud Computing
IP networks
Hardware
Encapsulation
delays
datacenter workloads
datacenter networks
datacenter applications
cross layer performance study
cross layer hybrid mesoscale simulation platform
computer centres
biblio
The price of virtualization: Performance isolation in multi-tenants networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:51am
online link utilization feedback mechanism
Virtualization
virtualisation
Substrates
Servers
resource management
resource allocation network
Ports (Computers)
OpenFlow protocol
address space isolation
network virtualization
multitenants datacenter network
Labeling
Internet evolutionary path
internet
flow space isolation
Bandwidth
biblio
In-Network Compute Extensions for Rate-Adaptive Content Delivery in Mobile Networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:50am
rate adaptation
Mobility First project
mobility management (mobile radio)
network protocols
non-IP protocols
offloading work
pluggable compute-layer services
programmable nodes
protocol extensions
Protocols
Mobility
rate-adaptive content delivery
Servers
service providers
service-API extensions
Streaming media
trustworthiness
video streaming
video streams
video transcoding
in-network computing
Bit rate
clean slate enhancements
cloud
compute-layer extensions
computer architecture
context-awareness
data plane
en-route service-adaptation
GENI test bed
at-scale mobility
in-network services
internet
Internet architecture
Mobile communication
mobile computing
mobile devices
mobile end-user experience
mobile wireless networks
« first
‹ previous
…
83
84
85
86
87
88
89
90
91
…
next ›
last »