Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SQL
biblio
Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:13pm
SQL injection
privacy
program testing
pubcrawl
Regular Expression Inference
Resiliency
search problems
software maintenance
SQL
Policy-Governed Secure Collaboration
SQL Injection attacks
testing
vulnerabilities detection
vulnerable WAFs
WAF rule set
web application firewalls
Web application firewalls repair
web security
Human behavior
collaboration
combinatorial mathematics
combinatorial optimisation problem
Decision trees
filter rules
firewalls
Firewalls (computing)
genetic algorithms
Automated Testing
internet
learning (artificial intelligence)
legitimate requests
machine learning
multiobjective genetic algorithms
Policy
policy-based governance
biblio
A hybrid method for detection and prevention of SQL injection attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:13pm
serious security threat
Policy-Governed Secure Collaboration
Prevention
privacy
pubcrawl
Resiliency
Runtime
security of data
sensitive information
policy-based governance
Servers
SQL
SQL injection
SQL injection attack
SQL statements
SQLIA
static
web applications
detection
collaboration
common gateway interface
Computer hacking
Data mining
database design
database driven web applications
database management systems
Databases
access content
dynamic
Hacker
Human behavior
hybrid method
hybrid SQLIA
internet
Policy
biblio
Result evaluation of field authentication based SQL injection and XSS attack exposure
Submitted by grigby1 on Thu, 06/07/2018 - 2:13pm
Servers
policy-based governance
Policy-Governed Secure Collaboration
privacy
profited businesses
pubcrawl
Resiliency
security imperatives
security issues
Policy
SQL
SQL infusion
SQL injection
Structured Query Language
web based business
web communications
Web sites
XSS attack exposure
document processing
centralized mechanism
collaboration
Computer crime
Cross Site Scripting (XSS)
cross webpage scripting
cross-site scripting
data trades
Databases
authentication
electronic framework association
electronic frameworks
field authentication
framework
Human behavior
information classification
message authentication
pattern classification
biblio
SQL injection attack detection using fingerprints and pattern matching technique
Submitted by grigby1 on Thu, 06/07/2018 - 2:13pm
Policy
Web-based applications
String Search
SQL queries
SQL injection detection approaches
SQL Injection attacks
SQL injection attack detection framework
SQL Injection Attack Detection
SQL injection
SQL
Resiliency
pubcrawl
programming
privacy
Policy-Governed Secure Collaboration
policy-based governance
attack signatures
pattern matching technique
pattern matching
password
OWASP
Open Web Application Security Project Top Ten Cheat sheet
intranet
internet
Human behavior
fingerprinting method
Fingerprint recognition
fingerprint method
Engines
Databases
computer network security
collaboration
biblio
Testing Techniques and Analysis of SQL Injection Attacks
Submitted by grigby1 on Thu, 05/24/2018 - 11:08am
SQL Injection vulnerability
resilience
Resiliency
security of data
security systems
security testing
sensitive data
sensitive information
SQL
SQL injection
SQL Injection attacks
SQL injection problems
relational databases
SQL query
testing techniques
three-tier-architecture
traditional security policies
user interfaces
users
Web application vulnerabilities
web applications
Web sites
website
handy interface
attackers
Cogeneration
commonly used Web application attacks
composability
Data protection
database-driven Web applications
DH-HEMTs
different security systems
effective data protection systems
good target
governmental organizations
attack
Human behavior
integrated circuits
internet
Knowledge engineering
Metrics
penetration testing technique
program testing
proper data protection
pubcrawl
relational database security
biblio
A Program Optimization for Automatic Database Result Caching
Submitted by grigby1 on Mon, 03/26/2018 - 11:53am
database result caching
Metrics
program analysis
pubcrawl
resilience
Resiliency
Scalability
SQL
web applications
Web Caching
biblio
Eliminating Input-Based Attacks by Deriving Automated Encoders and Decoders from Context-Free Grammars
Submitted by grigby1 on Thu, 02/15/2018 - 10:44am
Resiliency
Human Factors
input based attack elimination
McHammerCoder
Nails
parsers
Protocols
pubcrawl
reliable systems
resilience
human factor
Scalability
secure systems
security of data
security vulnerabilities
Software systems
SQL
textual languages
unparsers
custom language
automated decoders
automated encoders
binary languages
communication language
context-free grammars
correct parsing
Cross Site Scripting
Cross Site Scripting (XSS)
cross-site scripting
arbitrary code execution
data encoding
encoding
encoding generation
formal languages
Generators
Grammar
grammars
Human behavior
biblio
DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer
Submitted by grigby1 on Tue, 01/16/2018 - 5:24pm
pubcrawl
feature extraction
Human behavior
internal attackers
internal threats detection
Intrusion Detection
Law
Markov processes
Metrics
DTMC
query processing
Resiliency
Servers
SQL
SQL queries
User behavior
users behaviors analysis
database system
Anomaly Detection
anomaly detection system
Application Layer
behavior features extraction
composability
Computer crime
computer network security
database management systems
anomaly behavior
Databases
DDoS attack detection
DDOS attack detection system
discrete-time markov chain
discrete-time Markov chains
distributed denial of service attack
distributed denial of service attacks
biblio
IQS-intelligent querying system using natural language processing
Submitted by K_Hooper on Wed, 01/10/2018 - 10:14am
Databases
Data mining
data warehousing
Generators
Human behavior
MR Generator
natural language processing
NLIDB
pubcrawl
Query Generator
Resiliency
Scalability
Semantic Builder
Semantics
SQL
Structured Query Language
biblio
Design and analysis of high performance crypt-NoSQL
Submitted by grigby1 on Thu, 12/28/2017 - 12:40pm
NoSQL databases
YCSB
Yahoo
storage management
SQL
Service Level Agreement
security scalability
security
secure data encryption
Scalability
relational databases
relational database security
query processing
pubcrawl
Performance
Benchmark testing
NoSQL
necessary data security
middleware layer
middleware
high performance crypt-NoSQL
encryption
Data Security
Cryptography
cryptographic methods
cloud service benchmark
cloud service
Cloud Computing
Cassandra
Big Data
« first
‹ previous
1
2
3
4
5
next ›
last »