Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
application security
biblio
An Analysis and Classification of Vulnerabilities in Web-Based Application Development
Submitted by grigby1 on Mon, 04/18/2022 - 2:37pm
application security
Companies
Complexity theory
Human behavior
Phase measurement
policy-based governance
pubcrawl
resilience
Resiliency
security
security weaknesses
Task Analysis
taxonomy
vulnerability classification
Web Application Security
Web application vulnerability
biblio
Application Security System Design of Internet of Things Based on Blockchain Technology
Submitted by grigby1 on Mon, 04/18/2022 - 11:37am
application security
Block Chain
blockchains
computer architecture
Control engineering
Internet of Things
network security
pubcrawl
Scalability
security scalability
Systems architecture
the internet of things
biblio
Towards Visual Analytics Dashboards for Provenance-driven Static Application Security Testing
Submitted by aekwall on Fri, 02/25/2022 - 10:46am
testing
Visualization application domains
software security engineering
Software and Application Security
security and privacy
human-centered computing
application security
codes
Provenance
visual analytics
security
composability
Human behavior
Resiliency
Metrics
pubcrawl
Computer crime
tools
visualization
biblio
Research on Impact Assessment of Attacks on Power Terminals
Submitted by grigby1 on Mon, 02/07/2022 - 4:44pm
power systems
Topology
telecommunication traffic
signal processing
Resiliency
resilience
Quantitative Indicators of Attack
pubcrawl
Power Terminal Security
application security
Power measurement
network on chip security
Microelectronics Security
Microelectronics
Metrics
composability
complex networks
Attack Assessment
biblio
Ontology-based Dynamic and Context-aware Security Assessment Automation for Critical Applications
Submitted by aekwall on Mon, 11/02/2020 - 2:46pm
ontology-based security model
Virtualization
virtualisation
ubiquitous computing
tools
testing
standards
security testing
security of data
Security Metrics
security assessment architecture
security aptitude
quantifiable security assessment process
pubcrawl
application configurations
ontology-based dynamic security assessment automation
Ontology
ontologies (artificial intelligence)
Ontologies
Metrics
metrics testing
Measurement
Dynamic Application Security Testing
critical infrastructure
context-aware security assessment automation
Business
automation
application security
biblio
Practical Combinatorial Testing for XSS Detection using Locally Optimized Attack Models
Submitted by aekwall on Mon, 09/28/2020 - 12:34pm
test case generation
black-box security testing
combinatorial testing
combinatorial testing methodology
locally optimized attack models
modelling approach
modelling scheme
security testing
security testing tool
Black box testing
test oracle
Verification Framework
web applications
XSS attack vectors
XSS detection
XSSInjector
Cross Site Scripting
security of data
cross-site scripting vulnerabilities
JavaScript
XSS
formal verification
application security
Web application
program testing
Grammar
cross-site scripting
tools
internet
pubcrawl
Human behavior
Resiliency
Scalability
biblio
High-risk Problem of Penetration Testing of Power Grid Rainstorm Disaster Artificial Intelligence Prediction System and Its Countermeasures
Submitted by aekwall on Mon, 06/01/2020 - 10:54am
resilience
power engineering computing
power grid rainstorm disaster artificial intelligence prediction system
power grid storm disasters
power grids
power Internet of Things
power meteorological service technology support
power system security
power transformer testing
program debugging
pubcrawl
policy-based governance
Resiliency
security of data
SQL
SQL blind bug
SQL injection
SQL injection attack behavior
SQL injection penetration test
Storms
system penetration testing
Vulnerability
host security
Artificial Intelligence
artificial storm prediction system
Companies
composability
disaster prediction information systems
disasters
electric power information system security defense work
electrical safety
energy Internet disaster safety
energy internet disaster security
application security
information security
Information systems
internet
Internet of Things
middleware
middleware security
network security
password
Penetration Testing
PGRDAIPS
biblio
FalconEye: A High-Performance Distributed Security Scanning System
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
secure practices
great precision
high-performance distributed security scanning system
human society
important transactions
input module
input source module
malicious users
open source framework
public domain software
scanner module
generic vulnerabilities scanning
sensitive data
Spider
support platform module
Vulnerability Scanning System
web applications
Web developers
web vulnerabilities
Pervasive Computing Security
Human Factors
Human behavior
Servers
Monitoring
Scalability
computer architecture
internet
Task Analysis
pubcrawl
Metrics
Resiliency
resilience
security of data
Uniform resource locators
web security
application security
common vulnerabilities test environment
conventional platform
detection systems
distributed scanning system
existing security vulnerabilities
FalconEye system
biblio
CapExec: Towards Transparently-Sandboxed Services
Submitted by grigby1 on Fri, 03/27/2020 - 11:37am
tools
collaboration
security
pubcrawl
policy-based governance
composability
Runtime
Libraries
Memory management
application security
Capsicum
Cats
compartmentalization
Containers
sandboxing
service manager
biblio
Detection of protection-impacting changes during software evolution
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
Role Based Access Control
WordPress
web applications
static analysis
source code changes
source code (software)
software maintenance
software evolution
Software
security vulnerabilities
security regression
Security Impact of Changes
role-based access control
Access Control
Resiliency
RBAC security
pubcrawl
protection-impacting changes
negative security changes
Mathematical model
maintenance engineering
Image edge detection
composability
Automated Secure Software Engineering
authorisation
application security
« first
‹ previous
1
2
3
next ›
last »