Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
web applications
biblio
Detection of protection-impacting changes during software evolution
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
Role Based Access Control
WordPress
web applications
static analysis
source code changes
source code (software)
software maintenance
software evolution
Software
security vulnerabilities
security regression
Security Impact of Changes
role-based access control
Access Control
Resiliency
RBAC security
pubcrawl
protection-impacting changes
negative security changes
Mathematical model
maintenance engineering
Image edge detection
composability
Automated Secure Software Engineering
authorisation
application security
biblio
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
tools
program testing
pubcrawl
Resiliency
security vulnerability
SQL
SQL injection
SQLI
SQLi vulnerabilities
SQLMAP
privacy
Vulnerability
Vulnerability Analysis
vulnerability scanner
Web application
web applications
Web sites
websites
WordPress
Drupal website pages
Computer hacking
content management
content management systems
Cybersecurity
data confidentiality
data integrity
Data protection
Databases
Computer crime
Human behavior
internet
Joomla website pages
LAMP server
Metrics
Nikto
Penetration Testing
policy-based-governance
biblio
Detection of SQL injection attacks by removing the parameter values of SQL query
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
privacy
web services
web applications
tools
Structured Query Language
SQL query
SQL Injection attacks
SQL injection attackers
SQL injection attack detection method
SQL injection
SQL
Runtime
Resiliency
query processing
pubcrawl
backend database
policy-based-governance
parameter values
mobile web applications
mobile computing
Metrics
Internet users
internet
Human behavior
desktop web application
Databases
database
confidential information
Conferences
Computer crime
biblio
A Machine Learning Approach to Malicious JavaScript Detection using Fixed Length Vector Representation
Submitted by grigby1 on Mon, 12/10/2018 - 11:38am
pubcrawl
malicious JavaScript detection
malicious JS code detection
malicious JS codes
Metrics
neural nets
neural network model
Neural networks
pattern classification
plugin software
Predictive models
machine learning
resilience
Resiliency
Support vector machines
Vectors
web applications
Web site
Web sites
Zero day attacks
Zero-day attacks
drive-by-download attacks
Browsers
classifier model
composability
Context modeling
cyberattacks
Cybersecurity
D3M Dataset
defense
Doc2Vec
Doc2Vec features
authoring languages
Drive-by-Download Data
feature extraction
feature learning
features extraction
fixed length vector representation
invasive software
Java
JavaScript
learning (artificial intelligence)
biblio
An Emulation of Sql Injection Disclosure and Deterrence
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
password
Web applications authorization
Web applications authentication
web applications
SQL injection disclosure
SQL injection deterrence
SQL injection
SQL
security vulnerability
Scalability
Resiliency
resilience
pubcrawl
password security
authentication
message authentication
internet
information retrieval
Human Factors
honey pots
Honey pot mechanism
Honey Pot
Heisenberg analysis
Databases
data retrieval
Companies
authorisation
biblio
A hybrid method for detection and prevention of SQL injection attacks
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
serious security threat
Policy-Governed Secure Collaboration
Prevention
privacy
pubcrawl
Resiliency
Runtime
security of data
sensitive information
policy-based governance
Servers
SQL
SQL injection
SQL injection attack
SQL statements
SQLIA
static
web applications
detection
collaboration
common gateway interface
Computer hacking
Data mining
database design
database driven web applications
database management systems
Databases
access content
dynamic
Hacker
Human behavior
hybrid method
hybrid SQLIA
internet
Policy
biblio
Testing Techniques and Analysis of SQL Injection Attacks
Submitted by grigby1 on Thu, 05/24/2018 - 12:08pm
SQL Injection vulnerability
resilience
Resiliency
security of data
security systems
security testing
sensitive data
sensitive information
SQL
SQL injection
SQL Injection attacks
SQL injection problems
relational databases
SQL query
testing techniques
three-tier-architecture
traditional security policies
user interfaces
users
Web application vulnerabilities
web applications
Web sites
website
handy interface
attackers
Cogeneration
commonly used Web application attacks
composability
Data protection
database-driven Web applications
DH-HEMTs
different security systems
effective data protection systems
good target
governmental organizations
attack
Human behavior
integrated circuits
internet
Knowledge engineering
Metrics
penetration testing technique
program testing
proper data protection
pubcrawl
relational database security
biblio
Database Encryption Using Asymmetric Keys: A Case Study
Submitted by grigby1 on Mon, 04/02/2018 - 12:48pm
encryption
web applications
test database
RSA
Resiliency
resilience
pubcrawl
padding
Metrics
Java API
Java
internet
Human behavior
encryption-decryption keys
encryption keys
encryption algorithms
application performance decrease
Encrypted database
ElGamal
ECIES
Distributed databases
Databases
database encryption
Data Security
Cryptography
cryptographic algorithms
Compositionality
Benchmark testing
asymmetric keys
Asymmetric Encryption
application program interfaces
biblio
A Program Optimization for Automatic Database Result Caching
Submitted by grigby1 on Mon, 03/26/2018 - 12:53pm
database result caching
Metrics
program analysis
pubcrawl
resilience
Resiliency
Scalability
SQL
web applications
Web Caching
biblio
Efficient and Flexible Discovery of PHP Application Vulnerabilities
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
PHP application vulnerabilities
web applications
vulnerability scanner
Syntactics
Structured Query Language
SQL injection
Servers
security
Scalability
Resiliency
resilience
pubcrawl
Programming Language
programming
code property graphs
PHP
Open Source Software
interprocedural analysis technique
internet
information flow analysis
Human Factors
human factor
Human behavior
graph theory
graph database
Databases
Cross Site Scripting (XSS)
Cross Site Scripting
« first
‹ previous
1
2
3
4
5
6
next ›
last »