Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
URL
biblio
Malicious URL Linkage Analysis and Common Pattern Discovery
Submitted by grigby1 on Fri, 12/11/2020 - 1:35pm
Malicious URL
website
Web pages
URL
Uniform resource locators
Resiliency
resilience
real enterprise network
pubcrawl
privacy
open-source threat intelligence
Metrics
Malware Analysis
malware
malicious URL linkage analysis
blacklisting
malicious domain names
malicious domain name
malicious destinations
linkage analysis
internet
Industries
Human behavior
graph-based model
graph theory
drive-by download
Crawlers
Couplings
computer network security
business communication
biblio
XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
attack vector
Cross Site Scripting
XSStudent
URL
universities
phishing attacks
instant access
direct access
Cross-site Scripting Attacks
controlled attack
Beef software
BeEF
Scalability
Educational institutions
JavaScript code
XSS
QR code
Java
internet
Computer crime
pubcrawl
Human behavior
Resiliency
biblio
A dark web story in-depth research and study conducted on the dark web based on forensic computing and security in Malaysia
Submitted by grigby1 on Wed, 09/12/2018 - 10:15am
URL
website links
skynet
Malaysia
forensic computing
dark web story
dark web security
cryptocurrency
Government
Instruments
pubcrawl
Digital Forensics
dark web
Web sites
internet
drugs
Conferences
malware
Human Factors
Human behavior
biblio
Identifying Email Threats Using Predictive Analysis
Submitted by grigby1 on Wed, 05/09/2018 - 1:54pm
Policy
URL
unsolicited e-mail
unseen emails
Uniform resource locators
targeted attacks
Support vector machines
static analysis
sandboxing
Random Forest
pubcrawl
Predictive models
predictive analysis approach
Policy-Governed systems
Policy-Governed Secure Collaboration
Analytical models
malware attachment
malware
malicious emails
machine learning model
machine learning algorithms
learning (artificial intelligence)
invasive software
feature extraction
email threat identification
Electronic mail
Computer crime
composability
collaboration
attackers
biblio
Detecting phishing attacks from URL by using NLP techniques
Submitted by K_Hooper on Wed, 01/10/2018 - 10:15am
natural language processing
URL
unsolicited e-mail
Uniform resource locators
security of data
Scalability
Resiliency
random forest algorithm
pubcrawl
Postal services
phishing attack analysis report
phishing attack
NLP
natural language processing techniques
Computer crime
Nanoelectromechanical systems
Markov processes
machine learning-based system
machine learning
learning (artificial intelligence)
Law
Internet users
internet
Human behavior
cyber security
cyber attack threats
Cyber Attack Detection
biblio
Automatic generation of Content Security Policy to mitigate cross site scripting
Submitted by grigby1 on Thu, 04/20/2017 - 11:38am
JavaScript
XSS
Web server layer
Web attack mitigation
Web attack detection
Web application
URL
Uniform resource locators
static contents
Servers
security policies
security of data
security
Resiliency
pubcrawl
Algorithm design and analysis
Java
internet
information technology
Human behavior
HTML
Databases
CSP mechanism
CSP
cross-site scripting mitigation
Cross Site Scripting
Cross Layer Security
composability
client-side security layer
automatic content security policy generation
biblio
Analysis of content copyright infringement in mobile application markets
Submitted by grigby1 on Tue, 03/07/2017 - 12:38pm
network locations
Writing
Windows mobile applications
video content
URL
unofficial mobile markets
Uniform resource locators
Servers
search keywords
search criteria
pubcrawl170109
pirated content streaming
paid streaming content
paid entertainment
android
Mobile handsets
mobile devices
mobile computing
Mobile communication
mobile application markets
Java
ios
Humanoid robots
cyber-lockers
copyright
content copyright infringement
back-end servers
Androids
biblio
A review on recent phishing attacks in Internet
Submitted by grigby1 on Tue, 03/07/2017 - 12:31pm
phishing attacks
Web sites
URL
unsolicited e-mail
Uniform resource locators
textual analysis
text analysis
Tabnapping
socially engineered messages
security
pubcrawl170109
phishing Website
phishing emails
Browsers
malware code
malware
invasive software
internet
illegal activity
email messages
email classification
Electronic mail
cyber-crime
Computer crime
Companies