Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
World Wide Web
biblio
Hardening Firefox against Injection Attacks
Submitted by grigby1 on Wed, 02/10/2021 - 12:22pm
real-world security vulnerabilities
user interfaces
Web pages
Browser Security
information retrieval
CSS
Firefox
Hardening
injection attacks
HTML
Universal Cross-site Scripting
untrusted Web content
user interface
Web browsers display content
web security
Web security model
Cross Site Scripting
online front-ends
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
internet
Runtime
security of data
JavaScript
World Wide Web
authoring languages
Browsers
operating systems
Web sites
hypermedia markup languages
biblio
Information Hiding for Text Files by Adopting the Genetic Algorithm and DNA Coding
Submitted by aekwall on Mon, 02/08/2021 - 12:51pm
mean square error
World Wide Web
transposition cipher method
text file
text encryption
text encoding
SNR
single to noise ratio
Resiliency
pubcrawl
PSNR
privacy
Predictive Metrics
performance evaluation
peak single to noise
MSE
Cryptography
Information hiding
image visual quality
image retrieval
Image Processing
Image coding
Human behavior
hidden data mechanism
genetic algorithms
genetic algorithm
encryption
DNA encoding
DNA cryptography
DNA coding
DNA
digital media
biblio
HTTP security headers analysis of top one million websites
Submitted by grigby1 on Fri, 11/20/2020 - 1:15pm
web security
security of data
Security Policies Analysis
server
set-cookie
strict- transport-security
tools
top one million websites survey
transport protocols
Uniform resource locators
security
web security policies
Web sites
websites
World Wide Web
www subdomain
X-content-type
X-frame-options
X-XSS-protection
X.509 Certificate
HTTP/2
Charge coupled devices
collaboration
content security policy
content-security-policy
Databases
HTTP headers
HTTP response headers analysis
HTTP security headers analysis
HTTP strict transport security
Alexa top one million list
HTTPs
HTTPS requests
hypermedia
internet
policy-based governance
Protocols
pubcrawl
redirections
referrer-policy
biblio
A Multi-factor Biometric Authentication Scheme Using Attack Recognition and Key Generator Technique for Security Vulnerabilities to Withstand Attacks
Submitted by aekwall on Mon, 06/01/2020 - 10:04am
key generator technique
World Wide Web
withstand external attacks
security vulnerabilities
security
Resiliency
resilience
pubcrawl
password
multifactor biometric authentication scheme
multifactor authentication
Multi-factor authentication
Metrics
attack recognition
internet
information sharing
Human Factors
Human behavior
Fingerprint recognition
Databases
Data Security
data privacy
Communication networks
biometrics (access control)
biometric
authorisation
biblio
The Creation Process of a Secure and Private Mobile Web Browser with no Ads and no Popups
Submitted by grigby1 on Fri, 04/17/2020 - 9:44am
Metrics
Web Browser Security
World Wide Web
Web sites
secure mode
private mode
mobile Web browser
Mobile Applications
hypermedia markup languages
HTML5 Web page
creation process
Browsers
Compositionality
security of data
online front-ends
mobile computing
composability
web services
internet
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
An Adaptive Machine Learning Based Approach for Phishing Detection Using Hybrid Features
Submitted by grigby1 on Fri, 04/10/2020 - 11:36am
machine learning
World Wide Web
Webpages source code
Web threats
Web sites
web security
URLs
Uniform resource locators
reliable detection system
real-time systems
pubcrawl
phishing Websites
Phishing Detection
phishing attackers
Phishing
adaptive machine learning based approach
Learning Classifier System
learning (artificial intelligence)
internet
intelligent phishing detection
Hypertext systems
hybrid features
Human Factors
Human behavior
feature-rich machine learning technique
feature extraction
cyber security
Computer crime
blacklisting
anti-phishing system
biblio
Invited Paper: The Applications of Machine Learning in Privacy Notice and Choice
Submitted by grigby1 on Fri, 04/03/2020 - 11:34am
Privacy Policies
World Wide Web
user interactions
taxonomy
privacy stakeholders
privacy notice
privacy landscape
privacy awareness
online privacy practices
General Data Protection Regulation
privacy
Companies
Scalability
data privacy
Human behavior
pubcrawl
machine learning
Data collection
learning (artificial intelligence)
biblio
Cross Site Scripting: Investigations in PHP Web Application
Submitted by aekwall on Mon, 12/16/2019 - 1:17pm
PHP Web application
XSS
World Wide Web
web security
Web application utilisation
tools
static analysis
Servers
security of data
Scalability
resilience
pubcrawl
-Software-Security
PHP technology
Licenses
internet
Human behavior
Cross-Site-Scripting
cross-site scripting
Cross Site Scripting
Browsers
-XSS
-Web-Application-Security
-Vulnerability
biblio
Artificial Intelligence (AI) for Web Accessibility: Is Conformance Evaluation a Way Forward?
Submitted by grigby1 on Thu, 01/31/2019 - 11:11am
privacy
World Wide Web
Web Standards
verification
testing
Scalability
Resiliency
resilience
pubcrawl
Accessibility for People with Disabilities
machine learning
Human Factors
Human behavior
Conformance
Assistive Technology
Artificial Intelligence
AI and Privacy
AI
biblio
Crawling and cluster hidden web using crawler framework and fuzzy-KNN
Submitted by grigby1 on Wed, 09/12/2018 - 10:15am
pattern classification
Web site level
Web crawling
search process
hidden Web clustering
hidden web
fuzzy-KNN method
fuzzy-KNN
database classification process
crawling framework
crawler framework
fuzzy set theory
Browsers
pubcrawl
database management systems
World Wide Web
Databases
search engines
Crawlers
Web sites
Weapons
internet
dark web
deep web
Human Factors
Human behavior
1
2
next ›
last »