Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Browsers
biblio
TLS with trustworthy certificate authorities
Submitted by grigby1 on Mon, 11/13/2017 - 11:59am
Resiliency
web services
trustworthy certificate authority
trustworthy certificate authorities
trusted platform modules
Trusted Platform Module
Trusted Computing
trust policies
TLS-based authentication mechanisms
TLS
TaoCA
Servers
authorisation
public key cryptography
pubcrawl
Hardware
Cryptography
cryptographic attestations
composability
cloud-based trustworthy Web services
cloud platforms
Cloud Computing
certificate authorities
Browsers
biblio
On implementing a client-server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) attacks
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
Dictionaries
Bandwidth
BREACH attack
BREACH attacks
browser reconnaissance and exfiltration via adaptive compression of hypertext attacks
Browsers
client-server setting
client-server systems
Compression
Compression algorithms
confidentiality
Cryptographic Protocols
Cryptography
data compression
Data protection
DEFLATE compression algorithm
Web traffic
encoding
encryption
fixed-dictionary compression
high-value secrets protection
HTTP compression
Network reconnaissance
plaintext
pubcrawl
Resiliency
security
security model
Servers
SSL/TLS
TLS protocol
transport protocols
biblio
A comprehensive inspection of cross site scripting attack
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
JavaScript
XSS vulnerability
XSS preventive measures
Web sites
Visual BASIC
VBScript
Uniform resource locators
Stored XSS
Servers
sensitive information access
security of data
Resiliency
Reflected XSS
pubcrawl
malware
malicious XSS link
ActiveX
Java
hypermedia markup languages
Human behavior
HTML
Flash
Electronic mail
Domed based XSS
Cross site scripting attack (XSS)
cross site scripting attack
Cross Site Scripting
computer security threat
composability
Browsers
automation
biblio
A New Cross-Site Scripting Detection Mechanism Integrated with HTML5 and CORS Properties by Using Browser Extensions
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Human behavior
XSS attack detection
web security
Uniform resource locators
Servers
security of data
security
Resiliency
pubcrawl
OWASP
malware
hypermedia markup languages
browser extension
HTML5
Databases
Cross-site scripting (XSS)
cross-site scripting detection mechanism
Cross Site Scripting
cross origin resource shearing (CORS)
CORS
composability
Browsers
browser extensions
biblio
Cyber security analysis using vulnerability assessment and penetration testing
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Penetration Testing
vulnerability assessment and penetration testing techniques
Vulnerability Assessment and Penetration Testing (VAPT)
vulnerability assessment
VAPT
testing
Technological innovation
technical assets
Sql Injection (SQLi)
security patches
security of data
security loopholes
security
Resiliency
pubcrawl
Browsers
Organizations
Market research
Human behavior
hacking activities
date security measurement
cyber-attacks
cyber threats
cyber security awareness
cyber security analysis
cyber security
Cross-site scripting (XSS)
Cross Site Scripting
Conferences
composability
biblio
Two for the price of one: A combined browser defense against XSS and clickjacking
Submitted by grigby1 on Thu, 04/20/2017 - 12:37pm
Information filters
XSS attack vector
XBuster
web security
Web pages
Web application threat
security of data
Resiliency
pubcrawl
partial script injection
online front-ends
Mozilla Firefox browser
JavaScript
Java
internet
attack vector
Human behavior
HTTP request parameter
HTML injection
HTML
Engines
Cross Site Scripting
Context
composability
client-side defence
clickjacking
Browsers
browser defense
browser
attribute injection
biblio
Phishing - the threat that still exists
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
online security attack
Uniform resource locators
statistical analysis
sensitive information harvesting
Radiation detectors
pubcrawl170109
phishing attack
Phishing
Password theft
online security threat
antiphishing systems
Google
Electronic mail
cyber security
Computer hacking
Computer Fraud
Computer crime
Browsers
authorisation
biblio
Counterfeiting and Defending the Digital Forensic Process
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
anti-forensics
antiforensic techniques
Browsers
categorization
Computer crime
Computers
digital evidences
digital forensic process
Digital Forensics
forensic analysis
Forensics
initial phase
mitigation techniques
pubcrawl170109
Software
taxonomy
biblio
A review on recent phishing attacks in Internet
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
phishing attacks
Web sites
URL
unsolicited e-mail
Uniform resource locators
textual analysis
text analysis
Tabnapping
socially engineered messages
security
pubcrawl170109
phishing Website
phishing emails
Browsers
malware code
malware
invasive software
internet
illegal activity
email messages
email classification
Electronic mail
cyber-crime
Computer crime
Companies
biblio
"An extended web browser for id/locator separation network"
Submitted by grigby1 on Tue, 02/21/2017 - 12:21pm
online front-ends
id/locator
IDNet
IDNet browser
IDNet-based web applications
idp
internet
Internet content
IP networks
id-locator separation scheme
Protocols
pubcrawl170103
Routing
Streaming media
Universal Resource Identifier
URID
web services
browser
ID fetching
ID
HTML
host-to-host model
future internet projects
Future Internet
domain-insulated autonomous network architecture
DIANA
content management
content distribution
content dissemination model
content delivery networks
CDNs
Browsers
browser-based Web application
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »