Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SQL injection attack
biblio
D-ForenRIA: Distributed Reconstruction of User-Interactions for Rich Internet Applications
Submitted by grigby1 on Mon, 05/22/2017 - 1:05pm
data privacy
http traces
Human behavior
incident forensics
Metrics
privacy
pubcrawl
Resiliency
rich internet applications
SQL injection
SQL injection attack
traffic replay
user-interactions reconstruction
biblio
Hacking the DBMS to Prevent Injection Attacks
Submitted by grigby1 on Mon, 05/22/2017 - 1:04pm
data privacy
dbms self-protection
Human behavior
injection attacks
Metrics
privacy
pubcrawl
Resiliency
security
software security
SQL injection
SQL injection attack
web applications
biblio
System Attribute Measures of Network Security Analyzer
Submitted by grigby1 on Mon, 05/22/2017 - 1:04pm
network coding
URL Rewriting
SQL injection attack
SQL injection
security
Resiliency
pubcrawl
privacy
Packets
cross-site scripting
Multiple Attacks
Metrics
intrusion prevention system
intrusion detection system
Human behavior
efficiency
data privacy
biblio
Runtime Input Validation for Java Web Applications Using Static Bytecode Instrumentation
Submitted by grigby1 on Mon, 05/22/2017 - 1:04pm
bytecode instrumentation
data privacy
Human behavior
input validation
Java web application
Metrics
path traversal
privacy
pubcrawl
Resiliency
SQL injection
SQL injection attack
biblio
SOFIA: An Automated Security Oracle for Black-box Testing of SQL-injection Vulnerabilities
Submitted by grigby1 on Mon, 05/22/2017 - 1:04pm
data privacy
Human behavior
Metrics
privacy
pubcrawl
Resiliency
Security oracle
security testing
SQL injection
SQL injection attack
SQL-Injection
biblio
Automated white-list learning technique for detection of malicious attack on web application
Submitted by grigby1 on Thu, 04/20/2017 - 11:38am
Logic gates
XSS attack
XML
Web Application Security
WAMG(Web Application Model Generator)
Structured Query Language
Standards organizations
SQL injection attack
semistructured XML case generation
security of data
security
Resiliency
pubcrawl
Organizations
malicious attack detection
maintenance engineering
automated white-list learning technique
learning (artificial intelligence)
internet
Human behavior
HTTP response splitting attack
HTTP request splitting attack
Generators
extensible markup language
Default Deny model(White Listing)
Default allow model (Black Listing)
default allow model
cross site scripting attack
Cross Site Scripting
composability
Buffer overflow attack
biblio
Detection of SQL injection and XSS attacks in three tier web applications
Submitted by grigby1 on Thu, 04/20/2017 - 11:38am
Resiliency
Web servers
Web Security Vulnerability
Virtualization
Three Tier Web Application
Static Web Application (SWA)
SQL injection attack
Skeleton
security
composability
pubcrawl
Intrusion Detection System (IDS)
Human behavior
Dynamic Web Application (DWA)
Databases
Cross Site Scripting (XSS)
Cross Site Scripting
biblio
Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack
Submitted by BrandonB on Tue, 05/05/2015 - 9:52am
SQL injection
XSS
Web vulnerability detection model
Web pages
web applicationt
Web application vulnerabilities
Web application
vulneralbilities
Uniform resource locators
testing
system cracker
structured query language injection
SQL injection attack
authorisation
SQL
security
internet
hacking tutorials
hacking tools
Databases
CSRF
cross-site scripting
cross-site request forgery
Computer crime
Computational modeling
« first
‹ previous
1
2