Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Web servers
biblio
Introduction to HTTP security headers and implementation of HTTP strict transport security (HSTS) header for HTTPS enforcing
Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
Metrics
Web sites
Web servers
Web browsers
Web Browser Security
transport protocols
SSL-TLS certificates
security policies
security of data
security
Resiliency
pubcrawl
Protocols
Browsers
IoT
Internet of Things
internet
hypermedia
Human behavior
HTTPS protocol
HTTP strict transport security header
HTTP protocol
HSTS
Computer crime
communication security
biblio
Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Web search crawler
multiple honeypot
pattern classification
Ports (Computers)
pubcrawl
Resiliency
vulnerability detection
vulnerability scanning detection
Web crawling
Metrics
Web servers
Web Service
web services
Web site
Web sites
Web vulnerability
web-based attacks
features of collective accesses
classification
collective access feature
Compositionality
computer network security
Conferences
crawler classification
Crawlers
decoy Web honeypot
attack prevention
Google
Human behavior
Human Factors
information collection
Intrusion Detection
IP networks
malicious threat
biblio
Detection of SQL injection and XSS attacks in three tier web applications
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Resiliency
Web servers
Web Security Vulnerability
Virtualization
Three Tier Web Application
Static Web Application (SWA)
SQL injection attack
Skeleton
security
composability
pubcrawl
Intrusion Detection System (IDS)
Human behavior
Dynamic Web Application (DWA)
Databases
Cross Site Scripting (XSS)
Cross Site Scripting
biblio
Analysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13
Submitted by grigby1 on Tue, 03/07/2017 - 1:38pm
Linux
Web servers
Web server
UDP DDoS flood cyber attack
transport protocols
Throughput
threshold limit
TCP throughput
security problems
round-trip time
reverse path forwarding
pubcrawl170109
network load balancing
Linux Ubuntu 13
Linux platform
access control lists
IP verify
IP networks
Internet world
internet
Floods
file servers
distributed denial of service attacks
defense mechanisms
CPU utilization
Computers
computer network security
Computer crime
authorisation
ACL
biblio
Continuous and Transparent User Identity Verification for Secure Internet Services
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
authentication
bioinformatics
mobile environments
Protocols
security
Servers
smart phones
Web servers
web services
biblio
Design, deployment and use of HTTP-based botnet (HBB) testbed
Submitted by BrandonB on Wed, 05/06/2015 - 10:23am
HTTP flooding
Web servers
Web access log
real time HTTP-based botnet
malware
invasive software
Intrusion Detection
Internet-connected computer programs
HTTP-GET flooding method
HTTP-based botnet
behavioural-based approaches
http bot traces
HBB testbed
Floods
distributed denial of service attacks
DDoS Attacks
Cyber Attacks
Computer crime
botnet detection systems
botnet
biblio
Threats in end to end commercial deployments of Wireless Sensor Networks and their cross layer solution
Submitted by BrandonB on Tue, 05/05/2015 - 10:15am
security goals
WSNSP
wireless sensor networks
wireless sensor network service providers
Wireless Sensor Network
web services
Web servers
threats
telecommunication security
standard security documents
sensor web portals
sensor portal
attacks
security attacks
security
Portals
Mobile communication
end to end commercial deployments
Department of Homeland Security
Department of Defense
cross layer solution
cross layer security solution
commercial
Availability
biblio
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
Submitted by BrandonB on Fri, 05/01/2015 - 9:12am
Remote Attestation
Web-based application
web services
Web service security
Web servers
Web browsers
trustworthiness
trusted computing group
Trusted Computing
SSL-TLS protocol
security
Apache Web server
Protocols
principal component analysis
platform integrity assurance
mutual attestation mechanism
Mozilla Firefox browser
Internet connectivity
extended TLS
endpoint platforms
client-server environment
Browsers
« first
‹ previous
1
2
3
4
5