Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Web attacks
biblio
Feature Popularity Between Different Web Attacks with Supervised Feature Selection Rankers
Submitted by grigby1 on Tue, 06/14/2022 - 1:13pm
Measurement
Web attacks
feature similarity
Feature Popularity
Feature Selection
big data security metrics
Intrusion Detection
SQL injection
Force
machine learning
Big Data
Scalability
Radio frequency
Conferences
Resiliency
resilience
pubcrawl
biblio
WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense
Submitted by aekwall on Thu, 05/13/2021 - 11:35am
Conferences
security
attack surface
moving target defense
Resiliency
pubcrawl
Metrics
web services
uncertainty
Complexity theory
Scalability
Web attacks
insufficient coverage problem
web gene tree
biblio
Investigating Web Defacement Campaigns at Large
Submitted by aekwall on Mon, 08/05/2019 - 10:35am
Resiliency
composability
pubcrawl
online hacktivism
Web attacks
web defacement
expandability
biblio
Surviving the Web: A Journey into Web Session Security
Submitted by grigby1 on Fri, 04/05/2019 - 10:26am
resilience
pubcrawl
Human behavior
Metrics
Web attacks
Browser Security
Compositionality
Resiliency
HTTP cookies
web defenses
web sessions
biblio
Micro-Honeypot: Using Browser Fingerprinting to Track Attackers
Submitted by grigby1 on Wed, 01/16/2019 - 2:32pm
Micro-Honeypot
browser fingerprinting technique
conventional web honeypots
cybercrime traceability
fingerprint
Fingerprint recognition
Forensics
honeypot
IP networks
Browser Fingerprinting
stepping stones
track attackers
tracking
web attacker
Web attacks
Web Browser Security
Compositionality
Browsers
data privacy
security
pubcrawl
Human behavior
Metrics
Resiliency
Hardware
invasive software
internet
Web sites
computer network security
Servers
Cryptography
Computer crime
anonymous networks
attack information
biblio
Distinguishing between Web Attacks and Vulnerability Scans Based on Behavioral Characteristics
Submitted by BrandonB on Wed, 05/06/2015 - 1:56pm
honeypots
Web systems
Web attacks
web applications
Web 2.0
vulnerability scans
Support vector machines
radio access networks
malicious cyber activities
internet
attacks
high-interaction honey pots
feature selection method
feature extraction
Encyclopedias
computer network security
classification of malicious cyber activities
Blogs
behavioral clustering analysis
behavioral characteristics