Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Java
biblio
"A Dynamic Supervisory Mechanism of Process Behaviors Based on Dalvik VM"
Submitted by grigby1 on Thu, 02/23/2017 - 11:34am
malware
system security sensitive behavior
system resource monitoring
system resource auditing
supervisory proces
spy privacy
smartphone security threats
smart phones
security
pubcrawl170105
private information
mobile phones
android
malicious chargeback software
Java
Humanoid robots
framework
dynamic supervisory mechanism
data privacy
Dalvik VM
Cameras
Androids
Android operating system
Android (operating system)
file
Gradual Information Flow Control
Submitted by akarns on Tue, 01/26/2016 - 2:52pm. Contributors:
Peter Thiemann
Luminous Fennell
Presented as part of the
2016 HCSS conference
.
gradual typing
Information Flow
Java
High Confidence Software and Systems Conference 2016
Academia
Presentation
HCSS 2016
biblio
The GAMBAS middleware and SDK for smart city applications
Submitted by BrandonB on Wed, 05/06/2015 - 1:19pm
Androids
Cities and towns
data acquisition
distraction-free support
GAMBAS middleware
Humanoid robots
Java
Java-based runtime system
middleware
Runtime
SDK
security
smart city applications
software development kit
software engineering
biblio
Preventing Client Side XSS with Rewrite Based Dynamic Information Flow
Submitted by BrandonB on Tue, 05/05/2015 - 9:49am
Semantics
JavaScript abstract syntax tree
JavaScript code
JSTFlow
online front-ends
performance overhead
rewrite based dynamic information flow
security
security of data
JavaScript
sensitive information leaks
Syntactics
taint engine
taint model
tainted information flow
web applications
XSS attacks
abstract intermediate representation
Java
internet
information security
information flow tracking framework
information flow analysis
fine-grained isolation
Engines
Data models
data flow analysis
cross-site scripting
code rewrite
client side XSS
Browsers
browser proxy
Abstracts
biblio
Improved CSRFGuard for CSRF attacks defense on Java EE platform
Submitted by BrandonB on Tue, 05/05/2015 - 9:45am
Java
XSS
Welding
Servlet filter
security of data
security
script tags
JavaScript event delegation mechanism
Java EE platform
Java EE
Browsers
HTML
Event Delegation
custom response wrapper
CSRFGuard
CSRF attack defense
cross-site scripting
cross-site request forgery attack
cross-site request forgery
Computers
biblio
Choosing a profile length in the SCAP method of source code authorship attribution
Submitted by BrandonB on Mon, 05/04/2015 - 1:21pm
authorship attribution
C++ language
data set
frequency control
Frequency measurement
information retrieval
Java
Java language
plagiarism detection
profile length
RNA
SCAP method
software forensics
source code (software)
source code authorship attribution
biblio
Bluetooth technology: ApXLglevel end-to-end security
Submitted by BrandonB on Mon, 05/04/2015 - 12:22pm
NIST Guide
encryption
file transfer
framework compatibility
framework reliability
Indexes
Java
Java language
Mobile communication
mobile phone
MS-Windows 7 operating system
music streaming
embedded appliances
operating system
operating systems (computers)
PAN
personal area network
personal area networks
privacy concern
programming languages
Satellites
security concern
smart phones
strong mutual authentication
communication technologies
ANSI C language
application-layer framework
ApXLglevel end-to-end security
audio streaming
authentication
authorisation
Binary Payload
Bluetooth
Bluetooth security specification
Bluetooth technology
C language
Android operating system
computer network reliability
computer network security
computing technologies
confidentiality
configurable add-on devices
cryptographic service providers
Cryptography
customizable add-on devices
data confidentiality
data integrity
biblio
Analysis of Field Data on Web Security Vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 2:03pm
security of data
XSS
Web security vulnerabilities
Web application vulnerabilities
vulnerability scanners
static code analyzers
SQL injection
SQL
source code (software)
source code
software faults
software fault tolerance
Software
security patches
attack injectors
security mechanisms
security
review and evaluation
realistic vulnerability
languages
Java
Intrusion Detection Systems
Internet applications
internet
field data analysis
code inspectors
Blogs
Awards activities
« first
‹ previous
…
3
4
5
6
7
8
9
10
11