Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
web applications
biblio
Challenges in Automation of Test Cases for Mobile Payment Apps
Submitted by aekwall on Mon, 07/27/2020 - 11:20am
android
iOS Security
test case automation
Software Testing
software development life cycle
Mobile Testing
Mobile Payment Application
mobile based payment application
Automatic testing
Automatic Test Cases
ios
iOS (operating system)
Compositionality
Humanoid robots
Androids
Android (operating system)
security of data
electronic money
Human Factors
smart phones
Mobile Applications
web applications
software engineering
automation
testing
program testing
internet
Metrics
pubcrawl
Resiliency
mobile computing
biblio
Fast Detection and Mitigation to DDoS Web Attack Based on Access Frequency
Submitted by aekwall on Mon, 06/29/2020 - 11:47am
internet
Web servers
Web request
web applications
Time-frequency Analysis
storage space
security of data
Resiliency
realtime attack response
pubcrawl
Protocols
Processing time
Metrics
IP networks
access frequency
immediate defense mechanism
Human behavior
hacker botnets
DDoS Web attack
DDoS attack mitigation
DDoS Detection and Mitigation
DDoS Attacks
DDoS attack detection
data structures
Computer crime
composability
botnet
attack packets
biblio
Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal
Submitted by aekwall on Mon, 06/08/2020 - 10:32am
hash collisions
hash algorithms
web portal
SHA-1
secured web portal
salt generation
salt algorithm
password hashing
matrix encryption key
Internet security
hash tables
hash message
Hash Function
Cryptography
enhanced secure hash algorithm-512
file organisation
Hash functions
Compositionality
Portals
Ciphers
password
web applications
Databases
pubcrawl
Resiliency
encryption
biblio
FalconEye: A High-Performance Distributed Security Scanning System
Submitted by grigby1 on Fri, 04/10/2020 - 11:53am
secure practices
great precision
high-performance distributed security scanning system
human society
important transactions
input module
input source module
malicious users
open source framework
public domain software
scanner module
generic vulnerabilities scanning
sensitive data
Spider
support platform module
Vulnerability Scanning System
web applications
Web developers
web vulnerabilities
Pervasive Computing Security
Human Factors
Human behavior
Servers
Monitoring
Scalability
computer architecture
internet
Task Analysis
pubcrawl
Metrics
Resiliency
resilience
security of data
Uniform resource locators
web security
application security
common vulnerabilities test environment
conventional platform
detection systems
distributed scanning system
existing security vulnerabilities
FalconEye system
biblio
Security Analytics For Heterogeneous Web
Submitted by grigby1 on Wed, 02/26/2020 - 3:42pm
Probabilistic Arithmetic Automata(PAA)
web services
web applications
vulnerability detection tools
tools
threat vectors
SVM classifier
Support vector machines
Support Vector Machine (SVM) Classifier
security of data
security analytics
security
reconfigurable PAA
pubcrawl
Probabilistic logic
business data processing
proactive behavior
privacy
pattern classification
Metrics
Measurement
machine learning algorithms
machine learning
learning (artificial intelligence)
internet
heterogeneous Web
feature extraction
dynamic PAA
data analysis
biblio
Automated Combinatorial Testing for Detecting SQL Vulnerabilities in Web Applications
Submitted by grigby1 on Mon, 02/10/2020 - 10:27am
privacy
web applications
tools
Syntactics
SQL vulnerabilities detection
SQL injection vulnerabilities
SQL injection
SQL detection
SQL database backend
SQL
security testing
security of data
Resiliency
resilience
pubcrawl
program testing
attack grammars
policy-based governance
Metrics
internet
Human behavior
gray-box testing method
gray-box testing
Grammar
Databases
concrete attack vectors
combinatorial testing methodology
combinatorial testing
collaboration
automated SQL injection vulnerability testing
automated combinatorial testing
biblio
Evaluation of SQL Injection Prevention Methods
Submitted by grigby1 on Mon, 02/10/2020 - 10:25am
security of data
websites
web services
web applications
SQL Injection Prevention Methods
SQL injection prevention
SQL injection issue
SQL injection
SQL detection
SQL
collaboration
Resiliency
resilience
pubcrawl
privacy
policy-based governance
Metrics
internet
Human behavior
evaluation
biblio
Detecting SQL Injection Attacks Using Grammar Pattern Recognition and Access Behavior Mining
Submitted by grigby1 on Mon, 02/10/2020 - 10:25am
SQL
policy-based governance
privacy
pubcrawl
resilience
Resiliency
security
security of data
security risks
Pattern recognition
SQL detection
SQL injection
SQL injection attack
SQL Injection attacks
Support vector machines
Web access log
Web access logs
web applications
grammars
ATTAR
Clustering algorithms
collaboration
Data mining
Databases
feature extraction
Grammar
grammar pattern recognition
access behavior mining
Human behavior
internet
learning (artificial intelligence)
machine learning
machine learning algorithm
machine learning algorithms
Metrics
biblio
Efficient Detection of Spam Messages Using OBF and CBF Blocking Techniques
Submitted by grigby1 on Mon, 02/10/2020 - 10:18am
spam detection
Picture Based Shifting
porter stemer algorithm
Postal services
Poster Stemmer algorithm
pubcrawl
Scalability
Servers
spam block mail
pattern clustering
spam detection system
spam mail-sifting system
spam message
spamming changes
unsolicited e-mail
user attacks
web applications
information filtering
Conferences
content based filter
Content based Filter (CBF)
e-mail filters
emails
Human behavior
Human Factors
Informatics
CBF blocking techniques
internet
k means clustering
mail message
Market research
Metrics
OBF
OBF blocking techniques
biblio
A Dynamic Detection Technique for XSS Vulnerabilities
Submitted by aekwall on Mon, 12/16/2019 - 1:17pm
internet
XSS vulnerabilities
web applications
Uniform resource locators
tools
testing
simulated attack
Servers
security of data
Scalability
resilience
Python language
Python
pubcrawl
Linux
attacks simulation
Human behavior
feature extraction
dynamic detection process
dynamic detection
detection tool
cross-site scripting(XSS)
cross-site scripting attack
cross-site scripting
Cross Site Scripting
Crawlers
crawler module
black-box testing
black box vulnerabilities detection
« first
‹ previous
1
2
3
4
5
6
next ›
last »