Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software
biblio
An analysis of XSS, CSRF and SQL injection in colombian software and web site development
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Human behavior
XSS
websites
Web sites
web security
web applications
SQL injection
SQL
software engineering
software development
Software
security protocols
Resiliency
pubcrawl
internet
Colombian companies
hacking protection
Hacking
Economics
Databases
CSRF
Cross Site Scripting attacks
Cross Site Scripting
Cross Site Request Forgery
Computer crime
composability
Colombian Web Site development
Colombian software development
Colombian organizations
biblio
How to find and fix software vulnerabilities with coverity static analysis
Submitted by grigby1 on Thu, 04/20/2017 - 12:37pm
composability
computer security
Conferences
Cross Site Scripting
Human behavior
IEEE 802.11 Standard
pubcrawl
real-time systems
Resiliency
Software
Virtual machining
biblio
Demonstrating Context-Aware Services in the Mobility First Future Internet Architecture
Submitted by grigby1 on Thu, 04/20/2017 - 12:33pm
clean slate
collaboration
computer architecture
Context
Context Service
Future Internet Architectures
Human behavior
internet
Metrics
multicast
Prototype Demo
pubcrawl
Resiliency
Routing protocols
security
Software
biblio
Hypervisor-Based Attestation of Virtual Environments
Submitted by grigby1 on Thu, 04/20/2017 - 12:29pm
Resiliency
Virtual machining
virtual machines
Virtual machine monitors
Virtualization
virtualisation
virtual environments
Trusted Computing
TPM device
Software
scalable remote attestation scheme
attestation
pubcrawl
private cloud
NFV
network function virtualization
Metrics
hypervisor-based attestation
Hardware
data privacy
computer architecture
Cloud Computing
biblio
Advanced pin entry method by resisting shoulder surfing attacks
Submitted by grigby1 on Wed, 03/08/2017 - 2:46pm
advanced pin entry method
authentication
Duplicate Login Pages
grid based authentication system
Hardware
Image color analysis
Keyboards
Keystroke Logging
Message Digest 5
Monitoring
PIN
pubcrawl170115
quantitative security investigation
shoulder surfing attacks
Software
telecommunication security
biblio
Continuous Authentication in a real world settings
Submitted by grigby1 on Wed, 03/08/2017 - 2:46pm
keystroke dynamics
trust model
Software
pubcrawl170115
Presses
periodic authentication
Mouse Dynamics
Mice
Mathematical model
authentication
feature extraction
data collection software
continuous authentication system
Continuous Authentication
Computers
computer input devices
behavioural biometrics
authorisation
biblio
Security function virtualization in software defined infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
SAVI SDI testbed
Whales
VNF
virtualized network function
virtualisation
software defined networking
software defined infrastructure
Software
Servers
security solution
security function virtualization
security attack
security
Bandwidth
pubcrawl170114
OPEX
network intrusion detection and prevention
IP networks
Inspection
honey-pot
DPI system
deep packet inspection system
computer network security
capital and operational expense
CAPEX
biblio
Securing a Deployment Pipeline
Submitted by grigby1 on Wed, 03/08/2017 - 2:30pm
Analytical models
continuous deployment
deployment pipeline security
DevOps
engineering process
Permission
Pipelines
pubcrawl170112
security of data
Software
Supply Chain
supply chains
trusted components
Trusted Computing
biblio
System security engineering vulnerability assessments for mission-critical systems and functions
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
supply chains
vulnerability identification
vulnerability assessment
US Department of Defense
testing
Systems engineering and theory
systems engineering
system security engineering vulnerability assessments
system security engineering
system security
system maturity points
Databases
Software
security of data
security
pubcrawl170112
mission-critical systems
mission-critical functions
military computing
DoD
Department of Defense
defense systems
biblio
Redesigning QR Code Ecosystem with Improved Mobile Security
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
mobile marketing
Software
security threat
security risks
risk analysis
redesigned QR code ecosystem
QR codes
QR code
public key infrastructure
Public key
pubcrawl170112
Mobile Security
advertising
mobile computing
life cycle
information system
Ecosystems
Ecosystem
digital signatures
digital signature mechanism
digital signature
Decoding
authentication
advertising campaigns
« first
‹ previous
…
70
71
72
73
74
75
76
77
78
…
next ›
last »