Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
web applications
biblio
Detecting DOM-Sourced Cross-Site Scripting in Browser Extensions
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
shadow DOM
JavaScript engines
metadata
online front-ends
program diagnostics
program testing
pubcrawl
resilience
Resiliency
Scalability
security of data
JavaScript
static analysis
text analysis
text filter
trees (mathematics)
Uniform resource locators
web applications
Web pages
web security
XSS vulnerabilities
DOM-sourced XSS
application program interfaces
browser extension vulnerability
browser extensions
Browsers
client-side vulnerabilities
computational linguistics
Cross Site Scripting
Cross Site Scripting (XSS)
Document Object Model
DOM-sourced cross-site scripting detection
abstract syntax tree parser
dynamic symbolic execution
HTML documents
HTML5 API
Human behavior
human factor
Human Factors
hypermedia markup languages
internet
Java
biblio
Measuring Personality for Automatic Elicitation of Privacy Preferences
Submitted by grigby1 on Tue, 02/06/2018 - 1:43pm
personality trait
web applications
user privacy preferences
user personality traits
user connectivity
Scalability
Resiliency
pubcrawl
psychology
privacy protection
privacy preference
privacy
Policy
big data privacy
Metrics
machine learning algorithms
machine learning
learning (artificial intelligence)
intelligent privacy management systems
Human Factors
Electronic mail
data privacy
Data collection
cultural differences
computer science
Big-Five personality traits
biblio
A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
policy-based governance
Mobile Application
mobile computing
PAM component
PMG component
Policy
Policy Activity Monitor component
Policy Based Governance
Policy Match Gate component
Policy Proxy DB
Policy Validation Unit
Logic gates
PPDB
protected cloud SaaS resources
pubcrawl
PVU
security
Servers
session management
user authentication
web applications
cloud SaaS applications
authentication
authorisation
authorization
authorized access
Big Data
big data security in the cloud
client authentication
Cloud Computing
cloud resource security
access management
collaboration
computing industry
data privacy
Databases
internet
Internet of Things
IT resources sharing
JSON token-based authentication
JSON Web Token (JWT)
biblio
A Hierarchical Architecture for Distributed Security Control of Large Scale Systems
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
software applications
Metrics
Monitoring
nonfunctional requirements
pubcrawl
Resiliency
Security Control
security controllers
security rules complexity
Malicious Traffic
Software Architecture
software complexity
Software systems
Sparks
telecommunication traffic
traffic load
web applications
computer network security
Big Data
Business
Cloud Computing
Complexity theory
composability
computational complexity
computer architecture
Computer crime
Attack detection
DDoS
DDoS attack detection
distributed security control
functional requirements
hierarchical distributed architecture
Human behavior
Large Scale Systems
biblio
Large-Scale Analysis Detection of Authentication Cross-Site Request Forgeries
Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
Metrics
Web sites
Web site authentication
Web Browser Security
web applications
testing
security testing strategies
security of data
Resiliency
public domain software
pubcrawl
open-source penetration testing tool OWASP ZAP
Microsoft
Auth-CSRF
large-scale analysis
identity management functionalities
Human behavior
History
Google
experimental analysis
eBay
CSRF-checker
Browsers
authentication CSRF
authentication cross-site request forgery detection
authentication
biblio
A Feasibility Study of Autonomically Detecting In-Process Cyber-Attacks
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Scalability
normal application behavior
off-line models
on-line models
perturbed applications
program transformation
pubcrawl
QoS requirements
quality-of-service requirements
Resiliency
Runtime
Monitoring
security
security of data
Software
software development process
software vulnerabilities
supervised training
Trusted Computing
trusted software application
unsafe actions
web applications
features extraction
application-agnostic cyber-attack detection system
Attack vectors
attacker
autonomic alert system
autonomic cyber-attack detection system
Autonomic Security
call graph
control flow
exemplar Web-based applications
feature extraction
application execution
heterogeneous software systems
in-process cyber-attacks
Instruments
Java
learning (artificial intelligence)
learning strategies
lightweight structures
machine learning techniques
Metrics
biblio
A classification methodology for security patterns to help fix software weaknesses
Submitted by grigby1 on Mon, 11/20/2017 - 12:22pm
Policy
web applications
software weakness fixing
software weakness
software life
Software
security weaknesses
Security weakness
security principles hierarchical organization
security principles
security patterns
security of data
Resiliency
pubcrawl
policy-based governance
authentication
pattern classification
pattern choice
Metrics
internet
Human behavior
Government
Governance
Fault tolerant systems
fault tolerance
Databases
collaboration
classification semiautomatic methodology
classification
authorization
biblio
An Automated Approach for Testing the Security of Web Applications Against Chained Attacks
Submitted by K_Hooper on Wed, 11/01/2017 - 11:03am
Chained Attacks
attack surface
Metrics
model-based testing
pubcrawl
resilience
Scalability
security
web applications
biblio
Hacking the DBMS to Prevent Injection Attacks
Submitted by grigby1 on Mon, 05/22/2017 - 2:04pm
data privacy
dbms self-protection
Human behavior
injection attacks
Metrics
privacy
pubcrawl
Resiliency
security
software security
SQL injection
SQL injection attack
web applications
biblio
An analysis of XSS, CSRF and SQL injection in colombian software and web site development
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Human behavior
XSS
websites
Web sites
web security
web applications
SQL injection
SQL
software engineering
software development
Software
security protocols
Resiliency
pubcrawl
internet
Colombian companies
hacking protection
Hacking
Economics
Databases
CSRF
Cross Site Scripting attacks
Cross Site Scripting
Cross Site Request Forgery
Computer crime
composability
Colombian Web Site development
Colombian software development
Colombian organizations
« first
‹ previous
1
2
3
4
5
6
next ›
last »