Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Crawlers
biblio
A Crawling Approach to Facilitate Open IoT Data Archiving and Reuse
Submitted by aekwall on Mon, 11/09/2020 - 12:20pm
Compositionality
Information Reuse and Security
SUMMON
simulation experiments
simulation environments
open IoT data archiving
IoT-cloud systems
IoT trace archiving service
information retrieval systems
data retrieval
data management services
automated Web crawling service
Cloud Computing
smart cities
visualization
sensor data
Crawlers
web services
Databases
Computational modeling
pubcrawl
Resiliency
Data models
Internet of Things
biblio
Search Prevention with Captcha Against Web Indexing: A Proof of Concept
Submitted by grigby1 on Fri, 09/11/2020 - 10:44am
containing sensitive words
webpages
web-based captcha conversion tool
web indexing
web index
Web crawler
search prevention algorithm
search prevention
search engine database
search engine bot
search engine
malicious web crawlers
Google search engine
Crawlers
security of data
captcha version
CAPTCHA
captchas
indexing
information retrieval
Google
Web pages
search engines
composability
internet
Human behavior
pubcrawl
security
biblio
A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence
Submitted by grigby1 on Fri, 07/10/2020 - 10:55am
security forums
learning (artificial intelligence)
machine learning
machine learning-based crawler
Monitoring
Open Source Software
open-source tools
pubcrawl
security
language models
security Web sites
service-oriented architecture
social networking (online)
social web
statistical language modelling techniques
Task Analysis
telecommunication security
tools
hacker forums
crawler architecture
Crawlers
crawling architecture
cyber security
cyber threat intelligence
cyber-security information
dark web
data harvesting
Computer crime
harvested information
Human behavior
Human Factors
information gathering task
Internet of Things
IoT
IoT-related cyber-threat intelligence
biblio
WC-PAD: Web Crawling based Phishing Attack Detection
Submitted by aekwall on Mon, 03/09/2020 - 10:12am
Web crawler
nonphishing websites
phase attack detection
phishing attack detector
phishing detection approach
phishing occurrence
phishing Websites
WC-PAD
web content
Heuristics
Web crawling
Web traffics
Zero-day phishing
zero-day phishing attack detection
zero-day phishing website attacks
Security Heuristics
predictability
IP networks
government websites
cloud storage hosting sites
attackers
blacklisting
Law
Uniform resource locators
Phishing
unsolicited e-mail
Web sites
Crawlers
Computer crime
pubcrawl
Resiliency
feature extraction
Scalability
biblio
A Dynamic Detection Technique for XSS Vulnerabilities
Submitted by aekwall on Mon, 12/16/2019 - 1:17pm
internet
XSS vulnerabilities
web applications
Uniform resource locators
tools
testing
simulated attack
Servers
security of data
Scalability
resilience
Python language
Python
pubcrawl
Linux
attacks simulation
Human behavior
feature extraction
dynamic detection process
dynamic detection
detection tool
cross-site scripting(XSS)
cross-site scripting attack
cross-site scripting
Cross Site Scripting
Crawlers
crawler module
black-box testing
black box vulnerabilities detection
biblio
A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
privacy
website connected database
Web sites
vulnerabilities
tools
threats
SQL injection attack
SQL injection
SQL
specific website
Servers
retrieving sensitive information
Resiliency
real-world implementation
query processing
pubcrawl
actual website
preventive measures
policy-based-governance
open source tools
Metrics
Linux
invasive software
Human behavior
foundational cybersecurity course
executing SQL queries
enhanced cybersecurity learning
Databases
Crawlers
computer science education
Computer hacking
Acunetix
biblio
Crawling and cluster hidden web using crawler framework and fuzzy-KNN
Submitted by grigby1 on Wed, 09/12/2018 - 10:15am
pattern classification
Web site level
Web crawling
search process
hidden Web clustering
hidden web
fuzzy-KNN method
fuzzy-KNN
database classification process
crawling framework
crawler framework
fuzzy set theory
Browsers
pubcrawl
database management systems
World Wide Web
Databases
search engines
Crawlers
Web sites
Weapons
internet
dark web
deep web
Human Factors
Human behavior
biblio
Phishing website detection framework through web scraping and data mining
Submitted by grigby1 on Wed, 12/20/2017 - 12:07pm
Crawlers
Data mining
feature extraction
heuristic weights
Human behavior
Human Factors
Phishing
Phishing Detection
pubcrawl
Training data
Uniform resource locators
visualization
Web crawler
biblio
Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots
Submitted by grigby1 on Mon, 11/27/2017 - 11:30am
Web search crawler
multiple honeypot
pattern classification
Ports (Computers)
pubcrawl
Resiliency
vulnerability detection
vulnerability scanning detection
Web crawling
Metrics
Web servers
Web Service
web services
Web site
Web sites
Web vulnerability
web-based attacks
features of collective accesses
classification
collective access feature
Compositionality
computer network security
Conferences
crawler classification
Crawlers
decoy Web honeypot
attack prevention
Google
Human behavior
Human Factors
information collection
Intrusion Detection
IP networks
malicious threat
biblio
Surfacing collaborated networks in dark web to find illicit and criminal content
Submitted by grigby1 on Fri, 11/03/2017 - 10:29am
social network analysis
espionage
extremist contents
financial frauds
hyperlinks
illegal activities
illegal services
illicit content
knowledge base
law enforcement
onion Web sites
public Internet
drug markets
social obligation
socket connections
terrorist contents
text analysis
Tor crawling
Tor functions
Tor hidden services
Tor Network
Web crawler
Web Graph
child exploitation images
Human behavior
Human Factors
dark web
drugs
internet
Weapons
Crawlers
information retrieval
Terrorism
social networking (online)
automatic Web site searching
pubcrawl
child exploitation videos
child sexual abuse
collaborated networks
Computer crime
content selection
criminal content
Criminal Network
Dark Crawler
dark Web crimes
Databases
« first
‹ previous
1
2
3
next ›
last »