Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SQL
biblio
Vulnerabilities and Threat Management in Relational Database Management Systems
Submitted by grigby1 on Fri, 03/17/2023 - 11:15am
Cryptography
relational database management systems
Heart
relational database security
Database systems
SQL injection
SQL
computer security
composability
Access Control
encryption
authentication
Safety
Resiliency
resilience
Metrics
Human behavior
pubcrawl
relational databases
biblio
SQL Injection Attack and Detection Based on GreenSQL Pattern Input Whitelist
Submitted by grigby1 on Mon, 03/15/2021 - 12:08pm
Resiliency
internet technology
IP networks
Metrics
optimized whitelist
Pattern
patterned input
pubcrawl
resilience
internet
SQL
SQL injection
SQL injection attack
SQL injection attack command
Whitelist
Whitelists
working mode
Big Data
intercept samples
input model
Information systems
GreenSQL pattern input whitelist
GreenSQL learning
GreenSQL database firewall
GreenSQL
Firewalls (computing)
firewalls
Databases
database protection
database management systems
dangerous threat
composability
command injection attacks
biblio
IoT Object Security towards On-off Attack Using Trustworthiness Management
Submitted by aekwall on Mon, 12/21/2020 - 12:35pm
Attack detection
trust value security
time 0.5518318 s
PHP database
On-offAttack
on-off attack
Object
MySQL database
trustworthiness management
IoT object security
MQTT
security of data
Topology
trustworthiness
network topology
authentication
SQL
Databases
composability
pubcrawl
Internet of Things
Servers
biblio
An Automated Composite Scanning Tool with Multiple Vulnerabilities
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
system vulnerabilities
Cross Site Scripting
vulnerability detection module
the vulnerability detection module
multiple vulnerabilities
frequent vulnerabilities
directory traversal
composite detection tool
automated composite scanning tool
Cross-site Scripting Attacks
computer network security
detection method
network security protection
SQL
SQL injection
pubcrawl
Human behavior
Resiliency
network security
Scalability
biblio
Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things
Submitted by grigby1 on Fri, 09/18/2020 - 1:08pm
vulnerability assessment
command injection attacks
supervisory control and data acquisition (SCADA)
structuredquery language injection attacks
intrusion detection solutions
Industrial Internet of Things (IIoT)
Industrial Internet of Things
IIoT systems
cyber-vulnerability assessment
cyber attack
electromagnetic interference
Big Data Analytics
IDS
SQL
machine learning (ML)
cyber-attacks
Internet of Things
Metrics
Structured Query Language
Protocols
network security
composability
production engineering computing
Intrusion Detection
intrusion detection system
Resiliency
resilience
pubcrawl
data analysis
machine learning
security of data
learning (artificial intelligence)
biblio
Rapid prototyping of flow-based detection methods using complex event processing
Submitted by grigby1 on Fri, 09/04/2020 - 2:25pm
Engines
brute force attacks
SQL-like syntax
SQL
network flows
network attacks
multistage HTTP brute force attack detection
flow-based detection methods
Event Processing Language
ESPER
EPL
detection method
complex event processing
CEP
security
policy-based governance
transport protocols
Human Factors
Databases
Uniform resource locators
Force
collaboration
pubcrawl
network security
Monitoring
IP networks
computer network security
biblio
High-risk Problem of Penetration Testing of Power Grid Rainstorm Disaster Artificial Intelligence Prediction System and Its Countermeasures
Submitted by aekwall on Mon, 06/01/2020 - 9:54am
resilience
power engineering computing
power grid rainstorm disaster artificial intelligence prediction system
power grid storm disasters
power grids
power Internet of Things
power meteorological service technology support
power system security
power transformer testing
program debugging
pubcrawl
policy-based governance
Resiliency
security of data
SQL
SQL blind bug
SQL injection
SQL injection attack behavior
SQL injection penetration test
Storms
system penetration testing
Vulnerability
host security
Artificial Intelligence
artificial storm prediction system
Companies
composability
disaster prediction information systems
disasters
electric power information system security defense work
electrical safety
energy Internet disaster safety
energy internet disaster security
application security
information security
Information systems
internet
Internet of Things
middleware
middleware security
network security
password
Penetration Testing
PGRDAIPS
biblio
Machine Learning and Social Media to Mine and Disseminate Big Scientific Data
Submitted by grigby1 on Fri, 05/22/2020 - 1:43pm
social media
ORNL
pubcrawl
query processing
relational databases
resilience
Resiliency
Scalability
scientific data mining
scientific databases
Oak Ridge National Laboratory
social media interaction
social networking (online)
SQL
SQL language
SQL queries
stream pipelining
structured databases
Structured Query Language
Twitter
Databases
big scientific data
Data discovery
data dissemination
Data mining
data retrieval
data streams
data-intensive projects
Database languages
database queries
atmospheric radiation measurement data center
easy search
environmental data centers
Human behavior
information dissemination
Laboratories
learning (artificial intelligence)
machine learning
machine learning framework
natural language processing
biblio
Conversion of Natural Language Query to SQL Query
Submitted by grigby1 on Fri, 05/22/2020 - 1:43pm
Resiliency
text format
Syntactic
student database
Structured Query Language
SQL query
SQL
speech-to-text
speech format
Semantics
Semantic
Scalability
Conferences
resilience
relational databases
relational database management system
query processing
pubcrawl
natural language query
natural language processing
Human behavior
Dictionaries
Databases
Data Dictionary
biblio
Impact of SQL Injection in Database Security
Submitted by aekwall on Mon, 04/20/2020 - 9:44am
public key cryptography
world web applications
hybrid encryption
Elliptical Curve Cryptography
database information
dangerous hacking technique
cracking technique
Database Security
AES
relational database security
ECC
relational databases
Elliptic curve cryptography
authorisation
SQL injection attack
SQL
Databases
SQL injection
standards
Metrics
composability
pubcrawl
Human behavior
Resiliency
advanced encryption standard
encryption
1
2
3
4
5
next ›
last »