Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Web
biblio
Phishing Detection Using Machine Learning Technique
Submitted by aekwall on Mon, 11/08/2021 - 3:23pm
password
Support vector machines
machine learning
pubcrawl
privacy
standards
Phishing
Credit cards
electronic commerce
principal component analysis
support vector machine
Web
threat vectors
Measurement
biblio
Dangers and Prevalence of Unprotected Web Fonts
Submitted by grigby1 on Fri, 04/17/2020 - 10:46am
Metrics
Web sites
Web Browser Security
Web
unprotected Web fonts
subresource integrity mechanism
stylesheets
SRI support
software vendors
software packages
software package
security-conscious users
Resiliency
resilience
pubcrawl
online front-ends
attack surface
maliciously modified version
malicious script
malicious font
internet
integrity
Human Factors
Human behavior
Google
fonts
fingerprint identification
Cryptography
cryptographic fingerprints verification
Compositionality
composability
CDNs
biblio
Raising the Bar Really High: An MTD Approach to Protect Data in Embedded Browsers
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
MTD
browser-based vulnerabilities
computing systems security
file servers
HTML
Internet users privacy
JavaScript injection attacks
mobile
Mobile Application
mobile operating systems
mobile WebViews
moving target defense
apps
MTD approach
server-side moving target defense technique
UI component
user interfaces
Web
Web browsers safety
Web pages
WebView-Embedded app
WebViews
Web Browser Security
smart phones
security
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
privacy
internet
composability
mobile computing
security of data
online front-ends
Data protection
Cyber Attacks
Java
Metrics
Browsers
Compositionality
operating systems (computers)
operating systems
android
biblio
Security-Related Commits in Open Source Web Browser Projects
Submitted by grigby1 on Fri, 04/17/2020 - 10:44am
browser
commits
composability
Compositionality
Human behavior
Human Factors
Metrics
pubcrawl
resilience
Resiliency
security
Web
Web Browser Security
biblio
Influence of Internet Protocols and CDN on Web Browsing
Submitted by grigby1 on Tue, 02/18/2020 - 11:56am
transport protocols
public websites
QUIC
QUIC/UDP protocols
resilience
Resiliency
Scalability
TLS/TCP protocols
tool Web View
Protocols
Web
Web browsing
Web Caching
Web contents
Web ecosystem
Web pages
Web servers
Web sites
HTTP/2 protocols
Alexa websites
CDN
CDN delivery
content delivery network
French Agency
french websites
Google
HTTP/2
pubcrawl
Human behavior
internet
Internet protocols
Loading
long-term measurement campaign
Metrics
monitoring website
Optical fiber networks
biblio
Research on SQL Injection Attack and Prevention Technology Based on Web
Submitted by grigby1 on Mon, 02/10/2020 - 11:25am
Prevention Technology
Web
user input data legitimacy
Structured Query Language
SQL injection attack
SQL injection
SQL detection
SQL
Servers
security of data
Resiliency
resilience
query processing
pubcrawl
privacy
application security risks
policy-based governance
Metrics
injection attack
Information filters
Human behavior
Databases
database security protection technology
database security attack
database query code
database management systems
Data protection
component
collaboration
B/S mode application development
file
ShadowBlock: A Lightweight and Stealthy Adblocking Browser
Submitted by Zhiyun Qian on Thu, 10/10/2019 - 4:56pm. Contributors:
Zhiyun Qian
Zubair Shafiq
Posters
Applied Privacy
Systems
Web
1719147
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Web Covert Timing Channels Detection Based on Entropy
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
Noise measurement
Web weaknesses
web vulnerabilities
Web covert timing channels detection
Web
victim
timing channel
telecommunication traffic
telecommunication channels
system security policies
security attacks
security
Scalability
resilience
Receivers
public access permission
channel entropy
modulation
memory storage
internet
information security
entropy-based detection method
entropy threshold
Entropy
disclosure information
delays
covert storage channels
covert channels
Convert Channel
computer network security
Compositionality
communication contrary
biblio
Modeling and Learning Distributed Word Representation with Metadata for Question Retrieval
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
question answering (information retrieval)
learning (artificial intelligence)
lexical gap problem
MB-NET
meta data
metadata
Metadata Discovery Problem
natural language processing
performance improvements
pubcrawl
large-scale English cQA data sets
question retrieval
Resiliency
Scalability
Semantics
text analysis
Text Mining
Vectors
Web
word processing
distributed word representation learning
basic category powered model
category information metadata
category powered models
community question answering
Compositionality
Computational modeling
Context modeling
cQA archives
distributed processing
Aggregates
distributed word representation modeling
fisher kernel
fixed-length vectors
information retrieval
internet
Kernel
Knowledge Discovery
large-scale automatic evaluation experiments
large-scale Chinese cQA data sets
biblio
Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: An Urgent Need for Systematic Security Regression Testing
Submitted by BrandonB on Tue, 05/05/2015 - 10:44am
security
XSS vector testing
XSS
Web browser attack surface
web applications
Web
Vectors
testing
systematic security regression testing
security of data
browser
regression analysis
Regression
Payloads
online front-ends
Mobile communication
HTML
cross-site scripting
Browsers