Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
human factor
biblio
Multiple Facets for Dynamic Information Flow with Exceptions
Submitted by grigby1 on Thu, 02/15/2018 - 10:44am
dynamic analysis
pubcrawl
Resiliency
Human behavior
Human Factors
web security
Scalability
resilience
human factor
JavaScript
Information Flow Control
Cross Site Scripting (XSS)
Cross Site Scripting
biblio
The Impact of Defensive Programming on I/O Cybersecurity Attacks
Submitted by grigby1 on Thu, 02/15/2018 - 10:44am
pubcrawl
Resiliency
Human behavior
Human Factors
Scalability
resilience
human factor
acm proceedings
text tagging
Word
Cross Site Scripting (XSS)
Cross Site Scripting
biblio
Code-Reuse Attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets
Submitted by grigby1 on Thu, 02/15/2018 - 10:44am
pubcrawl
Resiliency
Human behavior
Human Factors
Scalability
resilience
human factor
content security policy
waf
Web Application Security
XSS
XSS filters
xss mitigations
Cross Site Scripting (XSS)
Cross Site Scripting
biblio
Cross-site Scripting Attacks on Android Hybrid Applications
Submitted by grigby1 on Thu, 02/15/2018 - 10:44am
pubcrawl
Resiliency
Human behavior
Human Factors
Scalability
resilience
human factor
Cross-site Scripting Attacks
Hybrid Applications
WebView
Cross Site Scripting (XSS)
Cross Site Scripting
biblio
Blockchain explorer: An analytical process and investigation environment for bitcoin
Submitted by grigby1 on Thu, 02/15/2018 - 10:41am
Online banking
illicit trades
innovative decentralized architecture
invasive software
law administration
law enforcement
law enforcement investigation
law enforcement local environment
malware modus operandi
marketcap
illegal trades
pseudo anonymity
pubcrawl
Public key
Ransomware
real-time systems
Scalability
Training
USD
darknet marketplaces
bitcoin protocol network
bitcoin security
blockchain
blockchain explorer
Computer crime
computer network security
crime instances
cryptocurrency
Cryptographic Protocols
bitcoin analytical process
DDoS extortion
distributed ledger
financial data processing
graphical transaction relation
History
Human behavior
human factor
Human Factors
biblio
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
Submitted by grigby1 on Thu, 02/15/2018 - 10:41am
Peer-to-peer computing
Human behavior
human factor
Human Factors
internet
Internet routing infrastructure
IP networks
mining pools
P2P networks
electronic money
pubcrawl
Routing
routing advertisements
routing attacks
routing manipulation
Routing protocols
Scalability
telecommunication network routing
bitcoin security
authorisation
autonomous systems
BGP
BGP hijack
BGP hijacks
BGP routing data
bitcoin
Bitcoin hijacking
ASes
Bitcoin topology
Bitcoin traffic manipulation
Computer crime
cryptocurrencies
cryptocurrency
Cryptography
Data mining
delays
biblio
Zero-Collateral Lotteries in Bitcoin and Ethereum
Submitted by grigby1 on Thu, 02/15/2018 - 10:41am
Human behavior
zero-collateral lotteries
tournament bracket construction
scripting language
Scalability
pubcrawl
Protocols
privacy
off-chain setup phase
Human Factors
human factor
authoring languages
Europe
Ethereum-based implementation
electronic money
Cryptographic Protocols
cryptocurrency-based lottery protocols
contracts
bitcoin security
Bitcoin implementation
bitcoin
biblio
Evolution of bitcoin and security risk in bitcoin wallets
Submitted by grigby1 on Thu, 02/15/2018 - 10:41am
human factor
Trusted Computing
trust factor
threats on bitcoin network
Software
security risk
Scalability
pubcrawl
Protocols
Peer-to-peer computing
Human Factors
bitcoin
Human behavior
electronic money
distributed consensus in bitcoin
block-chain rewriting
bitcoin wallets
bitcoin wallet
Bitcoin system
bitcoin security
bitcoin management
bitcoin evolution
biblio
Have the security flaws surrounding BITCOIN effected the currency's value?
Submitted by grigby1 on Thu, 02/15/2018 - 10:41am
Scalability
Human Factors
market value
Online banking
peer to peer transactions
Peer-to-peer computing
private key
Protocols
pubcrawl
human factor
security breech
security flaws
security of data
statistical analysis
statistical data analysis
transaction processing
volatile currency
data analysis
Bitcoin protocol
bitcoin security
Bitcoin services
blockchain
Companies
complex public address
Crypto Currency Digital Security
currency value
bitcoin
decentralized virtual currency
digital currency
digital security environment
electronic money
financial data processing
Fluctuations
Human behavior
biblio
From Bitcoin to cybersecurity: A comparative study of blockchain application and security issues
Submitted by grigby1 on Thu, 02/15/2018 - 10:41am
bitcoin
bitcoin security
blockchain
computer security
Cybersecurity
Human behavior
human factor
Human Factors
Memory
privacy
privacy-protection
pubcrawl
Reliability
Scalability
tamper-proofing
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »