Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
Testing Techniques and Analysis of SQL Injection Attacks
Submitted by grigby1 on Thu, 05/24/2018 - 11:08am
SQL Injection vulnerability
resilience
Resiliency
security of data
security systems
security testing
sensitive data
sensitive information
SQL
SQL injection
SQL Injection attacks
SQL injection problems
relational databases
SQL query
testing techniques
three-tier-architecture
traditional security policies
user interfaces
users
Web application vulnerabilities
web applications
Web sites
website
handy interface
attackers
Cogeneration
commonly used Web application attacks
composability
Data protection
database-driven Web applications
DH-HEMTs
different security systems
effective data protection systems
good target
governmental organizations
attack
Human behavior
integrated circuits
internet
Knowledge engineering
Metrics
penetration testing technique
program testing
proper data protection
pubcrawl
relational database security
biblio
Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context
Submitted by grigby1 on Wed, 05/16/2018 - 12:47pm
Metrics
security levels
security level
secure protocol
secure cryptographic protocol
secrecy
Resiliency
resilience
Repudiation
pubcrawl
non-repudiation
multipart missions
multipart military missions
military mission
military context
military computing
authentication
man-in-the-middle attack
Logistics
internet
independent distributed decision levels
independent decision
human factor
Human behavior
encryption
distributed decision
digital signatures
decision level
Cryptographic Protocols
cryptographic protocol
critical military missions
composability
biblio
Hardening the Client-Side: A Guide to Enterprise-Level Hardening of Web Browsers
Submitted by K_Hooper on Wed, 05/09/2018 - 10:00am
security
least privilege tailored configurations
multiple web browsers
online front-ends
Organizations
Phishing
Plugin-based attacks
pubcrawl
Resiliency
Scalability
Secure Configuration
least privilege browser hardening
Security by Default
security of data
Servers
tools
un-trusted sites
Vegetation
web browser hardening
Web browsers
Web sites
Windows-based enterprise
enforced configuration
Browsers
business data processing
classic client desktop infrastructure
Computers
critical enterprise sites
critical trusted websites
cyber-compromise
Cybersecurity
data breaches
default configurations
attack avenues
enterprise-level hardening
enterprise-wide strategy
Google Chrome
Hardening
high-granularity tailored configurations
internet
Internet Explorer
JavaScript attacks
least privilege
biblio
Network economics of SDN-based infrastructures: Can we unlock value through ICN multicast?
Submitted by K_Hooper on Wed, 05/09/2018 - 9:52am
network economics
Web and internet services
Unicast
software defined networking
SDN security
SDN infrastructure
Scalability
Routing protocols
routing infrastructures
Resiliency
pubcrawl
Protocols
performance evaluation
operator networks
Bandwidth
native IP multicast
multicast protocols
migration costs
lightweight multicast service delivery
IP-over-ICN deployments
IP networks
IP multicast delivery
Internet Protocol services
internet
information-centric networking principles
ICN multicast
Economics
computer network security
biblio
TARN: A SDN-based traffic analysis resistant network architecture
Submitted by K_Hooper on Wed, 05/09/2018 - 9:52am
Scalability
network communications
Open vSwitches
PEERING BGP testbed
Peer-to-peer computing
pseudorandom IP addresses
pubcrawl
Resiliency
Routing
Routing protocols
large-scale traffic analysis resistant network support
SDN
SDN security
SDX solution
Software
software defined networking
TARN
telecommunication traffic
traffic analysis resistant network architecture
YouTube
Hidden Markov models
computer network security
customer-driven network services
customizable trustable end-to-end network services
destination IP prefix
destination networks
distributed software defined Internet exchange
DNS/IP filtering
end-to-end communication session
end-to-end network services
business model
intended destination AS's prefix
internet
Internet autonomous systems
Internet routing
IP addressing freedom
IP networks
IP prefixes
IPv4
IPv6
biblio
A Case Study for Automatic Detection of Steganographic Images in Network Traffic
Submitted by grigby1 on Tue, 05/01/2018 - 10:33am
Image coding
telecommunication traffic
steganography detection
Steganography
steganographic images
statistical signature based steganalysis algorithms
pubcrawl
privacy
open source tool
network traffic
Metrics
Media
internet
Algorithm design and analysis
embedded messages
Data mining
data encapsulation
data breach prevention
data breach detection
Cryptography
cover file
corporate networks
concealed data
composability
automatic detection
biblio
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs
Submitted by grigby1 on Tue, 05/01/2018 - 10:22am
Phishing
unsolicited e-mail
top-level domains security
top-level domains
TLDs security
statistical regression model
software metrics
Servers
security performance measurement
security
reputation metrics design
reputation metrics
regression analysis
phishing datasets
Computer crime
Measurement
malware datasets
malware
IP networks
invasive software
internet
intermediary incentives
Feeds
Ecosystems
domain name system
domain abuse
DNS ecosystem
cybercriminals
biblio
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs
Submitted by grigby1 on Mon, 04/30/2018 - 2:09pm
Phishing
unsolicited e-mail
top-level domains security
top-level domains
TLDs security
statistical regression model
software metrics
Servers
security performance measurement
Security Metrics
security
reputation metrics design
reputation metrics
regression analysis
pubcrawl
phishing datasets
Computer crime
Metrics
Measurement
malware datasets
malware
IP networks
invasive software
internet
intermediary incentives
Feeds
Ecosystems
domain name system
domain abuse
DNS ecosystem
cybercriminals
biblio
CENTRA: CENtrally Trusted Routing vAlidation for IGP
Submitted by grigby1 on Wed, 04/11/2018 - 2:03pm
routing policies
PKI
practical Internet
pubcrawl
public key cryptography
public key infrastructure
real-time systems
resilience
Resiliency
Routing
routing monitoring systems
OSPF
Routing protocols
Scalability
SDN
secure routing mechanism
secure routing policy
Software Defined Network
software defined networking
Trust Routing
trusted routing
YANG
IGP
anomalous routing detection
Anomaly Detection
authentication
CENTRA
Centrally Controlling
CENtrally Trusted Routing vAlidation framework
communication protocol
composability
computer network security
Data Model
anomalous routing blockage
interior gateway protocols
internet
Internet service providers
internetworking
ISP
knowledge base-this
Monitoring
Neighbor
NETCONF
network security
biblio
MalFire: Malware firewall for malicious content detection and protection
Submitted by K_Hooper on Wed, 04/04/2018 - 9:00am
malicious content protection
Web servers
vulnerability detection
user data security
user data privacy
tools
sensitive information
security
Resiliency
pubcrawl
privacy
online portion
Metrics
malware injection
malware firewall
malware
ad blocking tool
malicious content detection
MalFire
IP networks
invasive software
internet
Human behavior
firewalls
data privacy
Content Injection
contemporary threats
Compositionality
Companies
adware injection
adware content
Adware
« first
‹ previous
…
64
65
66
67
68
69
70
71
72
…
next ›
last »