Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
websites
biblio
A DNS Security Policy for Timely Detection of Malicious Modification on Webpages
Submitted by grigby1 on Mon, 01/31/2022 - 5:39pm
Browsers
web defacement
malicious modification
malicious browser extensions
websites
Telecommunications
Web Browser Security
Web pages
Phishing
Compositionality
security
domain name system
security policies
DNS
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
HTTP security headers analysis of top one million websites
Submitted by grigby1 on Fri, 11/20/2020 - 2:15pm
web security
security of data
Security Policies Analysis
server
set-cookie
strict- transport-security
tools
top one million websites survey
transport protocols
Uniform resource locators
security
web security policies
Web sites
websites
World Wide Web
www subdomain
X-content-type
X-frame-options
X-XSS-protection
X.509 Certificate
HTTP/2
Charge coupled devices
collaboration
content security policy
content-security-policy
Databases
HTTP headers
HTTP response headers analysis
HTTP security headers analysis
HTTP strict transport security
Alexa top one million list
HTTPs
HTTPS requests
hypermedia
internet
policy-based governance
Protocols
pubcrawl
redirections
referrer-policy
biblio
Exploring Adversaries to Defend Audio CAPTCHA
Submitted by grigby1 on Fri, 09/11/2020 - 11:44am
bots
captchas
CAPTCHA
adversarial audio captcha
adversarial audio datasets
adversarial examples attack
attack accuracy
basic iterative method
BIM
Noise measurement
deepFool
distortion
medium background noise
near-sighted users
single audio captcha
spoken digits
Web-based authentication method
websites
composability
authorisation
machine learning
machine learning algorithms
security
pubcrawl
Human behavior
internet
deep learning
learning (artificial intelligence)
Classification algorithms
neural nets
Speech recognition
deep learning models
Web sites
attack models
handicapped aids
biblio
Does Certificate Transparency Break the Web? Measuring Adoption and Error Rate
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
malicious certificates
Web sites
Error analysis
Certificate-Transparency
Computed tomography
CT
error rate
Google Chrome web browser
HTTPs
Compositionality
misissued certificates
search engines
security benefits
usable-security
Web-PKI
websites
Web Browser Security
security of data
Browsers
certificate transparency
Metrics
online front-ends
composability
internet
Ecosystems
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Servers
Monitoring
security
biblio
Evaluation of SQL Injection Prevention Methods
Submitted by grigby1 on Mon, 02/10/2020 - 11:25am
security of data
websites
web services
web applications
SQL Injection Prevention Methods
SQL injection prevention
SQL injection issue
SQL injection
SQL detection
SQL
collaboration
Resiliency
resilience
pubcrawl
privacy
policy-based governance
Metrics
internet
Human behavior
evaluation
biblio
A Spam Review Detection Method by Verifying Consistency among Multiple Review Sites
Submitted by grigby1 on Mon, 02/10/2020 - 11:19am
review sites
websites
Web sites
user reviews
user purchasing behavior
unsolicited e-mail
Spam review detection
spam review
spam detection
Software
sentiment analysis
Scalability
Conferences
review information
Reliability
pubcrawl
performance evaluation
Multiple review sites
Metrics
internet
Human Factors
Human behavior
consistency verification
consistency
biblio
Cross-Site Scripting for Graphic Data: Vulnerabilities and Prevention
Submitted by aekwall on Mon, 12/16/2019 - 2:17pm
Scalability
XSS vulnerabilities
XSS attacks
XSS
XML treatment method
XML
white list.
websites
Web sites
Vulnerability
testing
TES
SVG image
SVG
security of data
Cross Site Scripting
resilience
pubcrawl
malware
Human behavior
graphical content
graphic content
cross-site scripting
Computer graphics
code
Cascading style sheets
black list
attack
animation
Resiliency
biblio
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
tools
program testing
pubcrawl
Resiliency
security vulnerability
SQL
SQL injection
SQLI
SQLi vulnerabilities
SQLMAP
privacy
Vulnerability
Vulnerability Analysis
vulnerability scanner
Web application
web applications
Web sites
websites
WordPress
Drupal website pages
Computer hacking
content management
content management systems
Cybersecurity
data confidentiality
data integrity
Data protection
Databases
Computer crime
Human behavior
internet
Joomla website pages
LAMP server
Metrics
Nikto
Penetration Testing
policy-based-governance
biblio
An analysis of XSS, CSRF and SQL injection in colombian software and web site development
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Human behavior
XSS
websites
Web sites
web security
web applications
SQL injection
SQL
software engineering
software development
Software
security protocols
Resiliency
pubcrawl
internet
Colombian companies
hacking protection
Hacking
Economics
Databases
CSRF
Cross Site Scripting attacks
Cross Site Scripting
Cross Site Request Forgery
Computer crime
composability
Colombian Web Site development
Colombian software development
Colombian organizations