Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
HTML
biblio
Automatic generation of Content Security Policy to mitigate cross site scripting
Submitted by grigby1 on Thu, 04/20/2017 - 11:38am
JavaScript
XSS
Web server layer
Web attack mitigation
Web attack detection
Web application
URL
Uniform resource locators
static contents
Servers
security policies
security of data
security
Resiliency
pubcrawl
Algorithm design and analysis
Java
internet
information technology
Human behavior
HTML
Databases
CSP mechanism
CSP
cross-site scripting mitigation
Cross Site Scripting
Cross Layer Security
composability
client-side security layer
automatic content security policy generation
biblio
Two for the price of one: A combined browser defense against XSS and clickjacking
Submitted by grigby1 on Thu, 04/20/2017 - 11:37am
Information filters
XSS attack vector
XBuster
web security
Web pages
Web application threat
security of data
Resiliency
pubcrawl
partial script injection
online front-ends
Mozilla Firefox browser
JavaScript
Java
internet
attack vector
Human behavior
HTTP request parameter
HTML injection
HTML
Engines
Cross Site Scripting
Context
composability
client-side defence
clickjacking
Browsers
browser defense
browser
attribute injection
biblio
HTML and PDF Fuzzing Methodology in iOS
Submitted by grigby1 on Mon, 03/20/2017 - 9:47am
collaboration
composability
encryption
fuzzing
HTML
Human behavior
ios
iOS encryption
Jailbreak
Metrics
MobileSafari
PDF
pubcrawl
Resiliency
Scalability
biblio
HTML and PDF Fuzzing Methodology in iOS
Submitted by grigby1 on Mon, 03/20/2017 - 9:24am
collaboration
composability
encryption
fuzzing
HTML
Human behavior
ios
iOS encryption
Jailbreak
Metrics
MobileSafari
PDF
Resiliency
Scalability
biblio
Identifying digital threats in a hacker web forum
Submitted by grigby1 on Tue, 03/07/2017 - 12:39pm
Discussion forums
Social network services
sentiment analysis tool
sentiment analysis
query processing
pubcrawl170109
parts of speech tagger
natural language processing
malicious hackers
internet
HTML
Hacking
hacker Web forum
hacker language analysis
discussion posts
automated analysis tools
digital threat identification
Databases
data systems
data querying
Data mining
cyber-attacks
customized Web-crawler
critical infrastructures
critical infrastructure
critical computer networks
Computer hacking
Computer crime
communication platform
biblio
XSSDM: Towards detection and mitigation of cross-site scripting vulnerabilities in web applications
Submitted by grigby1 on Tue, 03/07/2017 - 12:31pm
Reactive power
XSSDM
Web Application Security
Web application
static taint analysis
static analysis
standards
source code (software)
source code
Servers
Sensitivity
security vulnerability
security
Computer crime
pubcrawl170109
program diagnostics
pattern matching technique
pattern matching
internet
HTML
cyber crime
cross-site scripting vulnerability detection
Cross-site scripting (XSS)
context-sensitive approach
Context Sensitive
Context
biblio
"An extended web browser for id/locator separation network"
Submitted by grigby1 on Tue, 02/21/2017 - 11:21am
online front-ends
id/locator
IDNet
IDNet browser
IDNet-based web applications
idp
internet
Internet content
IP networks
id-locator separation scheme
Protocols
pubcrawl170103
Routing
Streaming media
Universal Resource Identifier
URID
web services
browser
ID fetching
ID
HTML
host-to-host model
future internet projects
Future Internet
domain-insulated autonomous network architecture
DIANA
content management
content distribution
content dissemination model
content delivery networks
CDNs
Browsers
browser-based Web application
biblio
Web Application Vulnerability Prediction using Hybrid Program Analysis and Machine Learning
Submitted by BrandonB on Tue, 05/05/2015 - 9:55am
Data models
empirical study
HTML
input validation and sanitization
program analysis
security
security measures
Semisupervised learning
Servers
Software
Training
Vulnerability prediction
biblio
Automated Test Generation from Vulnerability Signatures
Submitted by BrandonB on Tue, 05/05/2015 - 9:54am
insecure Web applications
web services
vulnerability signatures
validation and sanitization
transition
testing
string analysis
static string analysis undecidability
state
security
scripting languages
program testing
program diagnostics
path coverage
Algorithm design and analysis
HTML
digital signatures
Databases
automatic vulnerability signature computation
automated test case generation
automata-based test generation
automata-based static string analysis techniques
automata theory
automata
authoring languages
attack string discovery
Approximation methods
biblio
Constructing secure web applications with proper data validations
Submitted by BrandonB on Tue, 05/05/2015 - 9:53am
Computational modeling
computer network security
critical web application vulnerabilities
Cross Site Scripting
data validations
HTML
injection
injections
internet
secure Web applications
security
validation
Vulnerability
XML
XSS
« first
‹ previous
1
2
3
next ›
last »