Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SQL
biblio
Finally, Safely-extensible and Efficient Language-integrated Query
Submitted by grigby1 on Mon, 05/22/2017 - 12:58pm
collaboration
Compositionality
Computing Theory
EDSL
Human Factors
language-integrated query
LINQ
Metrics
pubcrawl
relational database security
Resiliency
safe coding standards
SQL
tagless-final
biblio
An analysis of XSS, CSRF and SQL injection in colombian software and web site development
Submitted by grigby1 on Thu, 04/20/2017 - 11:38am
Human behavior
XSS
websites
Web sites
web security
web applications
SQL injection
SQL
software engineering
software development
Software
security protocols
Resiliency
pubcrawl
internet
Colombian companies
hacking protection
Hacking
Economics
Databases
CSRF
Cross Site Scripting attacks
Cross Site Scripting
Cross Site Request Forgery
Computer crime
composability
Colombian Web Site development
Colombian software development
Colombian organizations
biblio
Detection of Malicious Transaction in Database Using Log Mining Approach
Submitted by BrandonB on Wed, 05/06/2015 - 1:06pm
Intrusion Detection
Training
SQL
security of data
relational databases
query structures
query database
malicious transaction detection
log mining approach
anomalous database transactions
domain dependency rules
Database systems
Database Security
data sequence rules
Data mining
Computers
automatic discovery
biblio
Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack
Submitted by BrandonB on Tue, 05/05/2015 - 9:52am
SQL injection
XSS
Web vulnerability detection model
Web pages
web applicationt
Web application vulnerabilities
Web application
vulneralbilities
Uniform resource locators
testing
system cracker
structured query language injection
SQL injection attack
authorisation
SQL
security
internet
hacking tutorials
hacking tools
Databases
CSRF
cross-site scripting
cross-site request forgery
Computer crime
Computational modeling
biblio
Static analysis approaches to detect SQL injection and cross site scripting vulnerabilities in web applications: A survey
Submitted by BrandonB on Tue, 05/05/2015 - 9:40am
SQLI
social communications
Software
software development life cycle
software maintenance
software reliability
source code
source code (software)
SQL
SQL injection
Servers
static analysi
static analysis
testing
vulnerabilitie
vulnerability detection
web applicatio
web applications
XSS
legacy Web applications
attack prevention
Cross Site Scripting
cross site scripting vulnerabilities
defensive programming
financial transaction
Guidelines
health problem
internet
Analytical models
malicious users
Manuals
program diagnostics
programming
programming mistakes
security of data
security vulnerabilities
security weaknesses
biblio
The role of triggers in database forensics
Submitted by BrandonB on Mon, 05/04/2015 - 1:28pm
forensic interpretation
SQL standard
SQL
Reliability
processes
Monitoring
methods
metadata
meta data
Irrigation
Forensics
attribution processes
Digital Forensics
digital forensic analysis methods
digital forensic analysis
Dictionaries
Databases
database triggers
database trigger handling
database trigger analysis
database forensics
data definition level
biblio
Security of sharded NoSQL databases: A comparative analysis
Submitted by BrandonB on Fri, 05/01/2015 - 7:30am
encryption
SQL
Sharding
sharded NoSQL databases
Servers
security of data
security features
NoSQL sharding mechanisms
NoSQL
Access Control
Distributed databases
Database Security
Data and Applications Security
Comparative Analysis
BASE
authentication
assessment criterion
biblio
Evaluation of Web Security Mechanisms Using Vulnerability amp; Attack Injection
Submitted by BrandonB on Thu, 04/30/2015 - 2:06pm
security
Web application security mechanism evaluation
vulnerability-&-attack injector tool
vulnerability injection methodology
VAIT
TV
SQL Injection attacks
SQL
software fault tolerance
Software
security of data
attack injection methodology
review and evaluation
Probes
intrusion detection system
Internet applications
internet
Input variables
Fault injection
fault diagnosis
Educational institutions
Databases
biblio
Analysis of Field Data on Web Security Vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 2:03pm
security of data
XSS
Web security vulnerabilities
Web application vulnerabilities
vulnerability scanners
static code analyzers
SQL injection
SQL
source code (software)
source code
software faults
software fault tolerance
Software
security patches
attack injectors
security mechanisms
security
review and evaluation
realistic vulnerability
languages
Java
Intrusion Detection Systems
Internet applications
internet
field data analysis
code inspectors
Blogs
Awards activities
« first
‹ previous
1
2
3
4
5