Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
OWASP
biblio
Topic Modeling for Cyber Threat Intelligence (CTI)
Submitted by grigby1 on Fri, 04/28/2023 - 2:51pm
cyber threat intelligence
threat recommendation
Maryam
application security
electronic commerce
topic modeling
OWASP
computational intelligence
Informatics
Cryptography
natural language processing
Compositionality
composability
Computational modeling
pubcrawl
security
Computer hacking
biblio
SAT: Integrated Multi-agent Blackbox Security Assessment Tool using Machine Learning
Submitted by aekwall on Fri, 03/31/2023 - 8:36am
documentation
Web Vulnera-bility Scanner
web security
web applications
security testing
pentesting
OWASP
DVWA
Mobile Security
application security
security
Prototypes
Black Box Attacks
machine learning
composability
Resiliency
Metrics
pubcrawl
information security
biblio
OWASP Attack Prevention
Submitted by grigby1 on Fri, 02/03/2023 - 2:51pm
Knowledge engineering
Web Application Firewall
open systems
SQL injection detection
Communication Systems
cross-site scripting
OWASP
security vulnerabilities
Web servers
pubcrawl
SQL injection
Firewalls (computing)
privacy
Resiliency
resilience
policy-based governance
Metrics
Human behavior
biblio
A Novel Approach Exploiting Machine Learning to Detect SQLi Attacks
Submitted by grigby1 on Fri, 02/03/2023 - 2:50pm
Databases
false negative
CountVectorizer
SQL injection detection
False Positive
OWASP
SQL injection
Performance analysis
attacks
Data mining
feature extraction
privacy
Analytical models
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
machine learning algorithms
biblio
Detecting Security Vulnerabilities in Website using Python
Submitted by aekwall on Thu, 06/24/2021 - 10:55am
Conferences
security
Resiliency
pubcrawl
composability
tools
vulnerabilities
Python
Automated Response Actions
information technology
Payloads
Communication Systems
Cross Site Scripting
OWASP
biblio
Object-oriented software metrics in software code vulnerability analysis
Submitted by grigby1 on Tue, 04/27/2021 - 3:01pm
object oriented security
Resiliency
composability
Metrics
pubcrawl
code evaluation
Measurement
OWASP
security
Security Metrics
software security
vulnerabilities
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 1:41pm
OWASP
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
information confidentiality
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
software engineering
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
security of data
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
biblio
SQL injection attack detection using fingerprints and pattern matching technique
Submitted by grigby1 on Thu, 06/07/2018 - 2:13pm
Policy
Web-based applications
String Search
SQL queries
SQL injection detection approaches
SQL Injection attacks
SQL injection attack detection framework
SQL Injection Attack Detection
SQL injection
SQL
Resiliency
pubcrawl
programming
privacy
Policy-Governed Secure Collaboration
policy-based governance
attack signatures
pattern matching technique
pattern matching
password
OWASP
Open Web Application Security Project Top Ten Cheat sheet
intranet
internet
Human behavior
fingerprinting method
Fingerprint recognition
fingerprint method
Engines
Databases
computer network security
collaboration
biblio
Payload recognition and detection of Cross Site Scripting attack
Submitted by grigby1 on Thu, 02/15/2018 - 10:44am
payload recognition
XSS attack
Web Application Security
testing
Servers
security of data
security
Scalability
Resiliency
resilience
regular expression pattern matching
regular expression
pubcrawl
preprocessing method
Ports (Computers)
Payloads
coding practices
Pattern recognition
OWASP
Open Web Application Security Project
NIDS
IP networks
internet
Human Factors
human factor
Human behavior
HTML
data payload
cross site scripting attack detection
Cross Site Scripting (XSS)
Cross Site Scripting
biblio
A New Cross-Site Scripting Detection Mechanism Integrated with HTML5 and CORS Properties by Using Browser Extensions
Submitted by grigby1 on Thu, 04/20/2017 - 11:38am
Human behavior
XSS attack detection
web security
Uniform resource locators
Servers
security of data
security
Resiliency
pubcrawl
OWASP
malware
hypermedia markup languages
browser extension
HTML5
Databases
Cross-site scripting (XSS)
cross-site scripting detection mechanism
Cross Site Scripting
cross origin resource shearing (CORS)
CORS
composability
Browsers
browser extensions