Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Browsers
biblio
Micro-Honeypot: Using Browser Fingerprinting to Track Attackers
Submitted by grigby1 on Wed, 01/16/2019 - 2:32pm
Micro-Honeypot
browser fingerprinting technique
conventional web honeypots
cybercrime traceability
fingerprint
Fingerprint recognition
Forensics
honeypot
IP networks
Browser Fingerprinting
stepping stones
track attackers
tracking
web attacker
Web attacks
Web Browser Security
Compositionality
Browsers
data privacy
security
pubcrawl
Human behavior
Metrics
Resiliency
Hardware
invasive software
internet
Web sites
computer network security
Servers
Cryptography
Computer crime
anonymous networks
attack information
biblio
Malicious browser extensions: A growing threat: A case study on Google Chrome: Ongoing work in progress
Submitted by grigby1 on Wed, 01/16/2019 - 2:32pm
Servers
online front-ends
party developers
payment frauds
Phishing
popular browser
pubcrawl
Resiliency
security of data
Metrics
spying
traditional functionalities
Uniform resource locators
unsolicited e-mail
Videos
Web Browser Security
Web pages
affiliate fraud
malicious browser extensions
malicious browser extension
internet
Human behavior
Google Chrome
fraud
Electronic mail
current browsers
Computer crime
Compositionality
Browsers
browser extension platform
browser extension
attacks
attack possibilities
biblio
A Google Chromium Browser Extension for Detecting XSS Attack in HTML5 Based Websites
Submitted by grigby1 on Wed, 01/16/2019 - 2:32pm
Human behavior
XSS attack
Web sites
Web pages
Web Browser Security
tools
tags
security of data
Resiliency
pubcrawl
online front-ends
Metrics
input validation
hypermedia markup languages
Attack vectors
HTML5 based Web sites
Google Chromium browser extension
extensions
Electronic mail
cross-site scripting attack
cross-site scripting
cross document messaging
computer science
Compositionality
Browsers
Browser Security
Attributes
attribute abuse
biblio
A Machine Learning Approach to Malicious JavaScript Detection using Fixed Length Vector Representation
Submitted by grigby1 on Mon, 12/10/2018 - 11:38am
pubcrawl
malicious JavaScript detection
malicious JS code detection
malicious JS codes
Metrics
neural nets
neural network model
Neural networks
pattern classification
plugin software
Predictive models
machine learning
resilience
Resiliency
Support vector machines
Vectors
web applications
Web site
Web sites
Zero day attacks
Zero-day attacks
drive-by-download attacks
Browsers
classifier model
composability
Context modeling
cyberattacks
Cybersecurity
D3M Dataset
defense
Doc2Vec
Doc2Vec features
authoring languages
Drive-by-Download Data
feature extraction
feature learning
features extraction
fixed length vector representation
invasive software
Java
JavaScript
learning (artificial intelligence)
biblio
Detecting Cryptomining Using Dynamic Analysis
Submitted by grigby1 on Mon, 11/19/2018 - 12:15pm
Browsers
computer security
cryptocurrency
cryptojacking
Human behavior
invasive software
malware
Metrics
pubcrawl
resilience
Resiliency
Runtime
standards
biblio
A First Look at Browser-Based Cryptojacking
Submitted by grigby1 on Mon, 11/19/2018 - 12:15pm
Monero
Google
Human behavior
internet
Java
JavaScript code
marketing data processing
Metrics
mining
financial data processing
online front-ends
pubcrawl
resilience
Resiliency
source code (software)
Web sites
website
cryptocurrency
bitcoin
blockchain
botnet
browser mining
browser-based mining
Browsers
Central Processing Unit
Coinhive
advertisement revenue
cryptocurrency Monero
Cryptography
cryptojacking
Data mining
data privacy
electronic money
ethics
biblio
Design of heterogeneous integrated digital signature system for ensuring platform independence
Submitted by grigby1 on Fri, 09/28/2018 - 3:12pm
per-user contract management features
WAS
User Terms
software maintenance
software extension
Software
Scalability
resilience
pubcrawl
platform independence
platform
browser environment
Insurance
HTML5
heterogeneous integrated digital signature system
digital transactions
digital signatures
digital signature
contracts
Companies
Browsers
biblio
Crawling and cluster hidden web using crawler framework and fuzzy-KNN
Submitted by grigby1 on Wed, 09/12/2018 - 11:15am
pattern classification
Web site level
Web crawling
search process
hidden Web clustering
hidden web
fuzzy-KNN method
fuzzy-KNN
database classification process
crawling framework
crawler framework
fuzzy set theory
Browsers
pubcrawl
database management systems
World Wide Web
Databases
search engines
Crawlers
Web sites
Weapons
internet
dark web
deep web
Human Factors
Human behavior
biblio
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers
Submitted by grigby1 on Thu, 06/07/2018 - 3:15pm
scalable system
PKI
privacy
privacy concerns
Protocols
Prototypes
pubcrawl
Rapid7
resilience
Resiliency
revocation
Scalability
online front-ends
security of data
Servers
space-efficient filter cascade data structure
SSL certificate revocations
SSL revocation checking
SSL Trust Models
TLS certificate revocations
TLS revocation checking
Transport Layer Security
University of Michigan
data structures
Browsers
certificate transparency
client-server systems
CRL
CRL checking
CRLite servers
CRLs
CRLSet
Cryptography
data privacy
Bloom filter
fail-closed security posture
Firefox
Google Certificate Transparency
Human behavior
internet
Metrics
OCSP
OCSP checking
OCSP Stapling
OneCRL
biblio
CCSP: A compressed certificate status protocol
Submitted by grigby1 on Thu, 06/07/2018 - 3:15pm
Online Certificate Status Protocol servers
Web servers
Web browser
timestamped certificates
SSL Trust Models
sophisticated cyber-attackers
signed certificates
Scalability
Resiliency
resilience
Receivers
public key cryptography
Public key
pubcrawl
Protocols
Browsers
OCSP-based methods
OCSP servers
Metrics
internet
Human behavior
Conferences
computer network security
compressed certificate status protocol
certification
Certificate Revocation Lists
certificate revocation checks
certificate authorities
CCSP
CAS
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »