Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SSL/TLS
biblio
Implementation of Blockchain Domain Control Verification (B-DCV)
Submitted by grigby1 on Fri, 02/03/2023 - 4:57pm
trust
SSL Trust Models
SSL/TLS
public keys
provable
DCV
ACME
PKI/CA
blockchains
Costs
Consensus algorithm
automation
Telecommunications
signal processing
ethereum
Public key
authentication
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
blockchain
security
biblio
Network Security Monitoring (NSM): Can it be Effective in a World with Encrypted Traffic?
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
Scalability
Resiliency
pubcrawl
MITM
HTTPs
Network Security Monitoring
SNI
SSL/TLS
Security by Default
biblio
Extended TLS Security and Defensive Algorithm in OpenFlow SDN
Submitted by grigby1 on Mon, 02/10/2020 - 11:31am
pubcrawl
Transport Layer Security
telecommunication channels
SSL/TLS
SSL Trust Models
software defined networking
Software Defined Network (SDN)
Software Defined Network
Servers
security
SDN security attacks
SDN OpenFlow communication
SDN controller
Scalability
Resiliency
resilience
SDN security
Protocols
OpenFlow SDN
OpenFlow
network topology
Network interfaces
network interface
Metrics
Human Factors
Human behavior
computer network security
computer network reliability
communication channel
certification
authentication
biblio
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach
Submitted by grigby1 on Mon, 02/10/2020 - 11:30am
secure socket layer
mobile radio
multiattribute associated fingerprints
multiple-attribute-based encrypted traffic classification
network management
pattern classification
Protocols
pubcrawl
resilience
Resiliency
Scalability
mobile network applications
security of data
Servers
SSL Trust Models
SSL/TLS
telecommunication security
telecommunication traffic
Training
Transport Layer Security
video streaming
encrypted protocol detection
application runtime
application-level traffic classification
attribute-lacking problem
certificate
classification guidance information
communication security
Correlation
Cryptographic Protocols
Cryptography
domain name
application data
Encrypted traffic classification
encrypted traffic classification methods
encrypted video stream classification
handshake certificates
Human behavior
Human Factors
MAAF
Markov processes
Metrics
biblio
Secure Coding Practices in Java: Challenges and Vulnerabilities
Submitted by grigby1 on Wed, 10/30/2019 - 10:53am
Security by Default
multiple security vulnerabilities
programming
programming challenges
programming obstacles
pubcrawl
resilience
Resiliency
Scalability
Secure Coding
secure coding assistance
secure coding practices
Libraries
Spring security
SSL-TLS security
SSL/TLS
StackOverflow
StackOverflow forum
StackOverflow posts
third-party framework
third-party libraries
XML
XML-based approaches
cryptographic hash functions
security
application program interfaces
authentication
authorisation
authorization
authorization features
Certificate Validation
complex Java-based
complicated cross-language data handling
Computer crime
cross-site request forgery attacks
coding theory
Cryptography
cryptography API
CSRF
developers time
empirical study
encoding
insecure coding practices
Java
Java platform
Java secure coding
biblio
STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
Submitted by grigby1 on Thu, 06/07/2018 - 3:15pm
pubcrawl
Human behavior
Scalability
resilience
Metrics
Resiliency
control-flow inference attacks
differential analysis
oracle attacks
SGX
side-channel
SSL/TLS
SSL Trust Models
biblio
On implementing a client-server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) attacks
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
Dictionaries
Bandwidth
BREACH attack
BREACH attacks
browser reconnaissance and exfiltration via adaptive compression of hypertext attacks
Browsers
client-server setting
client-server systems
Compression
Compression algorithms
confidentiality
Cryptographic Protocols
Cryptography
data compression
Data protection
DEFLATE compression algorithm
Web traffic
encoding
encryption
fixed-dictionary compression
high-value secrets protection
HTTP compression
Network reconnaissance
plaintext
pubcrawl
Resiliency
security
security model
Servers
SSL/TLS
TLS protocol
transport protocols