Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
web security
biblio
CanvasMirror: Secure Integration of Third-Party Libraries in a WebVR Environment
Submitted by grigby1 on Wed, 02/03/2021 - 12:10pm
Three-dimensional displays
resilience
secure integration
security
sensitive information
shared canvas
third-party context
third-party library providers
third-party sandboxing
rendering (computer graphics)
three-dimensional world
virtual reality
web security
Web technology
WebVR
WebVR environment
WebVR site
hypermedia markup languages
360-degree immersive browsing experiences
Browsers
CanvasMirror
composability
cyber physical systems
HTML canvas
Human behavior
Human Factors
immersive systems
internet
Libraries
Load modeling
Loading
online front-ends
privacy
pubcrawl
biblio
Detecting Malicious Web Requests Using an Enhanced TextCNN
Submitted by aekwall on Mon, 12/14/2020 - 11:31am
Convolutional Neural Network for Text Classification (TextCNN)
Web servers
deep learning
Semantics
Uniform resource locators
Predictive Metrics
web security
deep learning models
convolutional neural network for text classification
file servers
HTTP Dataset CSIC 2010
malicious Web request detection
Malicious Web requests detection
support vector machine (SVM)
TextCNN
Transferable statistical features
Web attack detection
composability
Data models
Support vector machines
support vector machine
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
security of data
pattern classification
internet
text analysis
convolutional neural nets
convolutional neural networks
text classification
statistical analysis
biblio
HTTP security headers analysis of top one million websites
Submitted by grigby1 on Fri, 11/20/2020 - 1:15pm
web security
security of data
Security Policies Analysis
server
set-cookie
strict- transport-security
tools
top one million websites survey
transport protocols
Uniform resource locators
security
web security policies
Web sites
websites
World Wide Web
www subdomain
X-content-type
X-frame-options
X-XSS-protection
X.509 Certificate
HTTP/2
Charge coupled devices
collaboration
content security policy
content-security-policy
Databases
HTTP headers
HTTP response headers analysis
HTTP security headers analysis
HTTP strict transport security
Alexa top one million list
HTTPs
HTTPS requests
hypermedia
internet
policy-based governance
Protocols
pubcrawl
redirections
referrer-policy
biblio
Website and Network Security Techniques against Brute Force Attacks using Honeypot
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
pubcrawl
web security
Human Factors
policy-based governance
network security
Brute force
honeypot
Medusa
brute force attacks
biblio
FalconEye: A High-Performance Distributed Security Scanning System
Submitted by grigby1 on Fri, 04/10/2020 - 11:53am
secure practices
great precision
high-performance distributed security scanning system
human society
important transactions
input module
input source module
malicious users
open source framework
public domain software
scanner module
generic vulnerabilities scanning
sensitive data
Spider
support platform module
Vulnerability Scanning System
web applications
Web developers
web vulnerabilities
Pervasive Computing Security
Human Factors
Human behavior
Servers
Monitoring
Scalability
computer architecture
internet
Task Analysis
pubcrawl
Metrics
Resiliency
resilience
security of data
Uniform resource locators
web security
application security
common vulnerabilities test environment
conventional platform
detection systems
distributed scanning system
existing security vulnerabilities
FalconEye system
biblio
An Adaptive Machine Learning Based Approach for Phishing Detection Using Hybrid Features
Submitted by grigby1 on Fri, 04/10/2020 - 11:36am
machine learning
World Wide Web
Webpages source code
Web threats
Web sites
web security
URLs
Uniform resource locators
reliable detection system
real-time systems
pubcrawl
phishing Websites
Phishing Detection
phishing attackers
Phishing
adaptive machine learning based approach
Learning Classifier System
learning (artificial intelligence)
internet
intelligent phishing detection
Hypertext systems
hybrid features
Human Factors
Human behavior
feature-rich machine learning technique
feature extraction
cyber security
Computer crime
blacklisting
anti-phishing system
biblio
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities
Submitted by aekwall on Mon, 03/09/2020 - 10:12am
Mitch approach
web security
tools
Task Analysis
supervised learning techniques
supervised learning technique
sensitive HTTP requests
security of data
Security Heuristics
security
Scalability
Resiliency
pubcrawl
predictability
Black Box Security
Manuals
machine learning solution
machine learning approach
machine learning
learning (artificial intelligence)
internet
HTTP requests
Forgery
CSRF vulnerabilities
cross-site request forgery
Cross Site Request Forgery
Browsers
black-box detection
biblio
An Empirical Study of the Framework Impact on the Security of JavaScript Web Applications
Submitted by aekwall on Mon, 12/16/2019 - 1:18pm
Cross Site Scripting
cross-site scripting
framework analysis
Human behavior
javascript security
pubcrawl
resilience
Scalability
template engines
web frameworks
web security
biblio
Cross Site Scripting: Investigations in PHP Web Application
Submitted by aekwall on Mon, 12/16/2019 - 1:17pm
PHP Web application
XSS
World Wide Web
web security
Web application utilisation
tools
static analysis
Servers
security of data
Scalability
resilience
pubcrawl
-Software-Security
PHP technology
Licenses
internet
Human behavior
Cross-Site-Scripting
cross-site scripting
Cross Site Scripting
Browsers
-XSS
-Web-Application-Security
-Vulnerability
biblio
An Evaluation of the HTTPS Adoption in Websites in Greece: Estimating the Users Awareness
Submitted by grigby1 on Wed, 10/23/2019 - 11:35am
HTTPs
Human behavior
Human Factors
Metrics
pubcrawl
resilience
Resiliency
Scalability
Security Risk Estimation
TLS
web security
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »