Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

default allow model

biblio

Visible to the public Automated white-list learning technique for detection of malicious attack on web application

Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
  • Logic gates
  • XSS attack
  • XML
  • Web Application Security
  • WAMG(Web Application Model Generator)
  • Structured Query Language
  • Standards organizations
  • SQL injection attack
  • semistructured XML case generation
  • security of data
  • security
  • Resiliency
  • pubcrawl
  • Organizations
  • malicious attack detection
  • maintenance engineering
  • automated white-list learning technique
  • learning (artificial intelligence)
  • internet
  • Human behavior
  • HTTP response splitting attack
  • HTTP request splitting attack
  • Generators
  • extensible markup language
  • Default Deny model(White Listing)
  • Default allow model (Black Listing)
  • default allow model
  • cross site scripting attack
  • Cross Site Scripting
  • composability
  • Buffer overflow attack

Terms of Use  |  ©2023. CPS-VO