Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Web 2.0
biblio
Metaverse Applications in Energy Internet
Submitted by grigby1 on Thu, 08/24/2023 - 1:51pm
immersive systems
digital twins
Web 2.0
Metaverse
Human Factors
Cyber Physical System
blockchains
user experience
energy internet
digital twin
cyber physical systems
Artificial Intelligence
Three-dimensional displays
virtual reality
blockchain
composability
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
Understanding Dark Web: A Systematic Literature Review
Submitted by grigby1 on Fri, 06/02/2023 - 3:30pm
pubcrawl
Bibliographies
dark web
Human behavior
Human Factors
Measurement
social networking (online)
systematic literature review
Systematics
Terrorism
Web 2.0
biblio
Correction of Spaces in Persian Sentences for Tokenization
Submitted by aekwall on Mon, 05/18/2020 - 9:55am
social media services
half-spaces
natural language tasks
normalization
online text
Persian
Persian language
Persian sentences
preprocessing tools
full-spaces
space
textual data
textual preprocessing
user comments
Web 2.0
word identification
word vocabulary
Scalability
exponential growth
automatic analysis
Tokenization
natural language processing
text analysis
Decision Making
tools
internet
standards
social networking (online)
Computational modeling
pubcrawl
Human behavior
Resiliency
Task Analysis
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 1:03pm
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
Distinguishing between Web Attacks and Vulnerability Scans Based on Behavioral Characteristics
Submitted by BrandonB on Wed, 05/06/2015 - 12:56pm
honeypots
Web systems
Web attacks
web applications
Web 2.0
vulnerability scans
Support vector machines
radio access networks
malicious cyber activities
internet
attacks
high-interaction honey pots
feature selection method
feature extraction
Encyclopedias
computer network security
classification of malicious cyber activities
Blogs
behavioral clustering analysis
behavioral characteristics
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 9:32am
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Tue, 05/05/2015 - 9:51am
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions