Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
application security
biblio
CAN FD Message Authentication Enhances Parallel in-vehicle Applications Security
Submitted by grigby1 on Fri, 05/12/2023 - 9:12am
masquerade attack
Space vehicles
security
Resiliency
resilience
real-time systems
pubcrawl
parallel In-vehicle applications
message authentication
application security
Human Factors
Human behavior
embedded systems
Costs
controller area network
CAN FD
automobile security
authentication
biblio
Diverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive: A Review
Submitted by grigby1 on Thu, 05/11/2023 - 3:47pm
malicious code
SQLIA
SQL injection attack
review
Resiliency
Mobile Security
command injection attacks
web security
Government
SQL injection
Market research
machine learning
Cybersecurity
Vulnerability
Structured Query Language
application security
Data Security
composability
Companies
resilience
Metrics
pubcrawl
biblio
Topic Modeling for Cyber Threat Intelligence (CTI)
Submitted by grigby1 on Fri, 04/28/2023 - 2:51pm
cyber threat intelligence
threat recommendation
Maryam
application security
electronic commerce
topic modeling
OWASP
computational intelligence
Informatics
Cryptography
natural language processing
Compositionality
composability
Computational modeling
pubcrawl
security
Computer hacking
biblio
Analysis of a Joint Data Security Architecture Integrating Artificial Intelligence and Cloud Computing in the Era of Big Data
Submitted by grigby1 on Fri, 03/31/2023 - 10:16am
computer architecture
Cloud Computing
pubcrawl
Metrics
resilience
Scalability
Artificial Intelligence
Big Data
Data mining
Data Security
big data security in the cloud
Resiliency
application security
biblio
SAT: Integrated Multi-agent Blackbox Security Assessment Tool using Machine Learning
Submitted by aekwall on Fri, 03/31/2023 - 8:36am
documentation
Web Vulnera-bility Scanner
web security
web applications
security testing
pentesting
OWASP
DVWA
Mobile Security
application security
security
Prototypes
Black Box Attacks
machine learning
composability
Resiliency
Metrics
pubcrawl
information security
biblio
Analysis of Network Security Protection of Smart Energy Meter
Submitted by aekwall on Fri, 01/13/2023 - 2:53pm
Meters
smart power network
smart power management
smart energy meter
Safety management
network security assurance
security policies
application security
energy measurement
Software
network security
Software algorithms
Resiliency
Metrics
Scalability
pubcrawl
Human Factors
biblio
Swarm Intelligence applied to SQL Injection
Submitted by aekwall on Thu, 01/05/2023 - 4:06pm
pubcrawl
composability
particle swarm optimization
Compositionality
Information systems
application security
SQL injection
Structured Query Language
Swam Intelligence
Vulnerabilities in Web Applications
Swarm Intelligence
biblio
Continuous Security Testing: A Case Study on Integrating Dynamic Security Testing Tools in CI/CD Pipelines
Submitted by aekwall on Fri, 08/26/2022 - 11:10am
security
tools
pubcrawl
Resiliency
composability
testing
Pipelines
Predictive Metrics
automation
Synthetic aperture sonar
application security
Continuous Integration
Continuous Security
devsecops
Dynamic Security Web Testing
Dynamical Systems
biblio
Inter-Language Static Analysis for Android Application Security
Submitted by aekwall on Fri, 08/12/2022 - 3:08pm
Conferences
tools
static analysis
pubcrawl
Mobile Security
malware
Java
Inter-language
Information systems
data-flow analysis
static code analysis
Computer Software and Theory
composabiity
Binary Analysis
application security
android
Resiliency
composability
Human behavior
biblio
Defences Against web Application Attacks and Detecting Phishing Links Using Machine Learning
Submitted by aekwall on Fri, 07/01/2022 - 8:47am
Classification algorithms
Chained Attacks
Web application
PHP and MySQL
long short term memory networks
logistic regression
Apache access Logs
server
application security
support vector machine
Random Forest
Phishing
Support vector machines
attacks
cyber security
Training data
machine learning
Resiliency
Scalability
pubcrawl
machine learning algorithms
Training
deep learning
1
2
3
next ›
last »