Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
injection
biblio
Security of operating system using the Metasploit framework by creating a backdoor from remote setup
Submitted by grigby1 on Fri, 12/23/2022 - 10:54am
Technological innovation
Windows 7
Msfconsole
metasploit
injection
DLL of meterpreter
backdoor. Armitage
Meterpreter
vulnerabilities
system security
TLS
security
Network
exploit
Windows Operating System Security
operating systems
Linux
composability
Resiliency
Metrics
pubcrawl
biblio
SQL Injection: Classification and Prevention
Submitted by grigby1 on Fri, 08/12/2022 - 3:34pm
command injection attacks
pubcrawl
composability
Resiliency
Metrics
Database attack
Databases
injection
Organizations
OWASP Top
security
Servers
SQL injection
SQL Prevention
SQLI
tools
biblio
An Analytical Study on Cross-Site Scripting
Submitted by grigby1 on Wed, 02/10/2021 - 12:20pm
browser side script
Cross Site Scripting
XSS vulnerabilities
XSS attack
Web application
symantic states
Persistent XSS attack
Non-persistent XSS attack
input validation
injection
fake malicious website
security of data
cross-site scripting
malicious scripts
phishing attack
Web sites
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN
Submitted by grigby1 on Wed, 03/18/2020 - 10:59am
Onos
traffic flow integrity
telecommunication traffic
software defined networking technology
software defined networking
SDN security
SDN data layer devices
SDN controller security
Scalability
Resiliency
resilience
pubcrawl
OpenStack platform
openstack
Onos controller
BCFR solution
network elements
network development
network communication security challenges
internet
injection
global network
false flow rules
false flow rule injection
Cryptography
controller authentication
computer network security
blockchain-based controller
blockchain technology
blockchain
biblio
Analog Man-in-the-middle Attack Against Link-based Packet Source Identification
Submitted by grigby1 on Mon, 03/20/2017 - 9:46am
command injection attacks
composability
injection
injection attacks
Metrics
pubcrawl
Resiliency
biblio
Physical Unclonable Functions-based Linear Encryption Against Code Reuse Attacks
Submitted by grigby1 on Mon, 03/20/2017 - 9:46am
code reuse attack
command injection attacks
composability
encryption
injection
injection attacks
jump oriented programming
Metrics
physical unclonable functions
pubcrawl
Resiliency
return oriented programming
rop attacks
Scalability
biblio
Bypassing Parity Protected Cryptography Using Laser Fault Injection in Cyber-Physical System
Submitted by grigby1 on Mon, 03/20/2017 - 9:45am
injection
Resiliency
register bit-flip
pubcrawl
parity
Metrics
Lightweight Ciphers
laser fault injection
injection attacks
command injection attacks
FPGA
cyber-physical system
controller area network security
concurrent error detection (CED)
concurrency security
concurrency and security
composability
biblio
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
Submitted by grigby1 on Mon, 03/20/2017 - 9:45am
ASLR
channel coding
command injection attacks
composability
injection
injection attacks
kernel vulnerabilities
Metrics
pubcrawl
Resiliency
timing attacks
windows operating systems security
biblio
Inter-vehicle Communication Assisted Localization with Resilience to False Data Injection Attacks
Submitted by grigby1 on Mon, 03/20/2017 - 9:45am
command injection attacks
composability
CSMA/CA
injection
injection attacks
localization algorithm
Metrics
pubcrawl
resilience
Resiliency
V2I
V2V
VANET
biblio
Object Injection Vulnerability Discovery Based on Latent Semantic Indexing
Submitted by grigby1 on Mon, 03/20/2017 - 9:45am
Automated Response Actions
code reuse
command injection attacks
composability
decomposition
information retrieval
injection
injection attacks
latent semantic analysis
Metrics
object injection attack
pubcrawl
Resiliency
web security
1
2
next ›
last »