Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Grammar
biblio
Automated Combinatorial Testing for Detecting SQL Vulnerabilities in Web Applications
Submitted by grigby1 on Mon, 02/10/2020 - 11:27am
privacy
web applications
tools
Syntactics
SQL vulnerabilities detection
SQL injection vulnerabilities
SQL injection
SQL detection
SQL database backend
SQL
security testing
security of data
Resiliency
resilience
pubcrawl
program testing
attack grammars
policy-based governance
Metrics
internet
Human behavior
gray-box testing method
gray-box testing
Grammar
Databases
concrete attack vectors
combinatorial testing methodology
combinatorial testing
collaboration
automated SQL injection vulnerability testing
automated combinatorial testing
biblio
Detecting SQL Injection Attacks Using Grammar Pattern Recognition and Access Behavior Mining
Submitted by grigby1 on Mon, 02/10/2020 - 11:25am
SQL
policy-based governance
privacy
pubcrawl
resilience
Resiliency
security
security of data
security risks
Pattern recognition
SQL detection
SQL injection
SQL injection attack
SQL Injection attacks
Support vector machines
Web access log
Web access logs
web applications
grammars
ATTAR
Clustering algorithms
collaboration
Data mining
Databases
feature extraction
Grammar
grammar pattern recognition
access behavior mining
Human behavior
internet
learning (artificial intelligence)
machine learning
machine learning algorithm
machine learning algorithms
Metrics
biblio
Formulation of SQL Injection Vulnerability Detection as Grammar Reachability Problem
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
Access Control
Compositionality
cross-site scripting
flow graphs
Grammar
Human behavior
Metrics
Production
pubcrawl
reachability analysis
Resiliency
SQL injection
static analysis
vulnerabilities detection
vulnerability detection
Web application
biblio
A Security Audit of the OpenPGP Format
Submitted by K_Hooper on Wed, 05/09/2018 - 10:56am
public domain software
OpenPGP
OpenPGP format
OpenPGP format specification
OpenPGP implementations
pattern classification
PGP
Production
Protocols
pubcrawl
open source Unix systems
Public key
Resiliency
Scalability
security audit
Security Audits
security vulnerabilities
Symantec PGP
Unix
email confidentiality
authorisation
computer security
context-free grammars
context-free languages
deterministic context free grammar
deterministic context free language
Electronic mail
email authenticity
authenticated package distributions
Formal Specification
GNU Privacy Guard
GnuPG
Grammar
Human behavior
language theoretical analysis
Language-theoretic security
malicious input data
biblio
Eliminating Input-Based Attacks by Deriving Automated Encoders and Decoders from Context-Free Grammars
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
Resiliency
Human Factors
input based attack elimination
McHammerCoder
Nails
parsers
Protocols
pubcrawl
reliable systems
resilience
human factor
Scalability
secure systems
security of data
security vulnerabilities
Software systems
SQL
textual languages
unparsers
custom language
automated decoders
automated encoders
binary languages
communication language
context-free grammars
correct parsing
Cross Site Scripting
Cross Site Scripting (XSS)
cross-site scripting
arbitrary code execution
data encoding
encoding
encoding generation
formal languages
Generators
Grammar
grammars
Human behavior
biblio
Cyber-Secure UAV Communications Using Heuristically Inferred Stochastic Grammars and Hard Real-Time Adaptive Waveform Synthesis and Evolution
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Information Reuse
Waveform Analysis and Synthesis
security
Resiliency
Receivers
real-time systems
pubcrawl
Production
Memory management
Adaptive Programming
Hard Real-Time Systems
grammatical inference
Grammar
Expectation-Driven Receiver
Evolutionary Programming
drones
computer security
Case-Based Reasoning
biblio
A Tripwire Grammar for Insider Threat Detection
Submitted by grigby1 on Fri, 10/27/2017 - 12:10pm
Metrics
pubcrawl
Resiliency
Human behavior
Scalability
attack-pattern
Grammar
insider threat
security policies
tripwire
threat mitigation
biblio
A Tripwire Grammar for Insider Threat Detection
Submitted by grigby1 on Tue, 08/22/2017 - 11:47am
attack-pattern
collaboration
Grammar
Human behavior
Human Factors
insider threat
Insider Threats
Metrics
pubcrawl
Resiliency
security policies
tripwire
biblio
Malicious code detection model based on behavior association
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
automation
behavior association
behavior monitor
Computers
Grammar
malicious code
Monitoring
pushdown automation
Trojan horses
Virtual machining
biblio
Institution Theory for Services Oriented Applications
Submitted by BrandonB on Fri, 05/01/2015 - 8:09am
Manganese
workflow applications
Unified modeling language
UML AD
UML activity diagram
System recovery
Syntactics
software engineering
service oriented applications
Semantics
semantic correctness
programming language semantics
Model transformation
Context
local semantic
institution theory
institution comorphism
Graphical Model
Grammar
formal verification
Formal Specification
Formal semantics
event-B specification
Event-B
diagrams
« first
‹ previous
1
2
3
next ›
last »