Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
automatic detection
biblio
An Automatic Detection and Analysis of the Bitcoin Generator Scam
Submitted by grigby1 on Tue, 03/09/2021 - 2:49pm
financial data processing
Web page
USD
security
search engines
scam instances
scam analysis
Scalability
pubcrawl
internet
Human behavior
generic system
Generators
free bitcoins
fraud detection
automatic detection
Data mining
cyberattack
Cryptography
cryptocurrency
cryptocurrencies
Crawlers
Computer crime
blockchain analysis
blockchain
bitcoin-based scam monitoring systems
bitcoin generator scam
bitcoin addresses
bitcoin
BGS
biblio
Automatic XSS Detection and Automatic Anti-Anti-Virus Payload Generation
Submitted by aekwall on Mon, 09/28/2020 - 12:35pm
parameter characteristics
SVM algorithm
XSS vulnerability
automatic anti-anti-virus payload generation tool
automatic bypassing
automatic detection
automatic XSS detection tool
DQN algorithm
malicious XSS attacks
malicious XSS parameters
Web application
RNN LSTM algorithm
rule-based WAF
user input parameters
user interaction
Web 2.0 era
XSS attack
XSS attack codes
Cross Site Scripting
internet
Support vector machines
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Human behavior
pubcrawl
Reinforcement learning
Scalability
tools
cross-site scripting
Training
recurrent neural nets
automatic generation
computer viruses
Payloads
Browsers
biblio
A Case Study for Automatic Detection of Steganographic Images in Network Traffic
Submitted by grigby1 on Tue, 05/01/2018 - 11:33am
Image coding
telecommunication traffic
steganography detection
Steganography
steganographic images
statistical signature based steganalysis algorithms
pubcrawl
privacy
open source tool
network traffic
Metrics
Media
internet
Algorithm design and analysis
embedded messages
Data mining
data encapsulation
data breach prevention
data breach detection
Cryptography
cover file
corporate networks
concealed data
composability
automatic detection