Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Databases
biblio
SQL Injection Attack and Detection Based on GreenSQL Pattern Input Whitelist
Submitted by grigby1 on Mon, 03/15/2021 - 1:08pm
Resiliency
internet technology
IP networks
Metrics
optimized whitelist
Pattern
patterned input
pubcrawl
resilience
internet
SQL
SQL injection
SQL injection attack
SQL injection attack command
Whitelist
Whitelists
working mode
Big Data
intercept samples
input model
Information systems
GreenSQL pattern input whitelist
GreenSQL learning
GreenSQL database firewall
GreenSQL
Firewalls (computing)
firewalls
Databases
database protection
database management systems
dangerous threat
composability
command injection attacks
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
network security
unique universal identifiers
Twitter
timestamp-based concurrency control algorithms
Synchronization
synchronisation
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Protocols
protocol
proactive defense
network security objectives
Concurrency
Network reconnaissance
Network Identification
network entity identifiers
moving target defense
IP networks
decentralized identifier distribution
Databases
Cryptography
cryptographically secure random values
Cryptographic Protocols
concurrency control
collision probability
security
biblio
Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 1:44pm
Databases
vector
Matrices
k-nearest neighbor search
clustering methods
Bayes method
nearest neighbor search
supervised learning
Classification algorithms
Microprogramming
Predictive Metrics
reverse engineering
Software
Measurement
neural network
supply chain management
Libraries
tools
internet
graph theory
pubcrawl
machine learning
Support vector machines
Task Analysis
biblio
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Submitted by aekwall on Mon, 02/22/2021 - 1:43pm
range queries
uniformly distributed queries
uniform query distribution
support size estimator
skewed query distributions
search-pattern leakage
search tokens
range attack
plaintext values
leakage-abuse attacks
known value reconstruction attacks
known structured encryption schemes
k-NN attack
k-nearest-neighbor queries
first value reconstruction attacks
distribution-agnostic reconstruction attacks
Servers
nearest neighbor search
data distribution
Approximation algorithms
encrypted databases
Histograms
Predictive Metrics
estimation
database management systems
Measurement
Databases
query processing
pubcrawl
nearest neighbour methods
encryption
Cryptography
biblio
Natural Language Processing on Diverse Data Layers Through Microservice Architecture
Submitted by aekwall on Mon, 02/22/2021 - 1:40pm
Scalability
Resiliency
Human behavior
pubcrawl
Databases
Distributed databases
relational databases
microservices
Memory
arrays
natural language processing
sentiment analysis
Text Mining
Distributed NLP
Serverless API
biblio
A GA-based Data Sanitization for Hiding Sensitive Information with Multi-Thresholds Constraint
Submitted by grigby1 on Tue, 02/16/2021 - 1:24pm
privacy preservation
multi-threshold
Itemsets
Data Sanitization
Statistics
Sociology
genetic algorithm
genetic algorithms
optimization
Compositionality
privacy
Data mining
Databases
Data models
security
Resiliency
resilience
Human behavior
pubcrawl
biblio
An Analysis of Effectiveness of Black-Box Web Application Scanners in Detection of Stored SQL Injection and Stored XSS Vulnerabilities
Submitted by grigby1 on Wed, 02/10/2021 - 1:22pm
Black-box scanners
Cross Site Scripting
cross-site scripting
Databases
Human behavior
Manuals
Payloads
pubcrawl
resilience
Resiliency
Scalability
SQL injection
stored SQLI
Stored XSS
Uniform resource locators
Web pages
biblio
Fake Generated Painting Detection Via Frequency Analysis
Submitted by aekwall on Mon, 02/01/2021 - 11:43am
Forgery
Paintings
image forgery detection
frequency analysis
Fourier transform
style transfer
neural style transfer
frequency-domain analysis
Painting
Scalability
Predictive Metrics
testing
Databases
pubcrawl
Resiliency
feature extraction
Support vector machines
biblio
Privacy Preserving Calculation in Cloud using Fully Homomorphic Encryption with Table Lookup
Submitted by aekwall on Mon, 02/01/2021 - 11:36am
cloud computation server
arithmetic operations
multi-threading
privacy preserving
storage costs
FHE
bit-wise encoding
bit-wise implementation
bit-wise operation
Homomorphic encryption
function evaluation
lookup table
privacy preserving calculation
single-input function
single-integer input function
time 13.0 min
time 60.0 min
two-input function
Protocols
Scalability
Servers
cloud servers
Cryptography
encrypted data
encryption
data privacy
Table lookup
Cloud Computing
Resiliency
pubcrawl
Metrics
Databases
information retrieval
fully homomorphic encryption
Human Factors
encoding
biblio
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks
Submitted by aekwall on Mon, 01/25/2021 - 1:02pm
security
Protocols
Software
computer architecture
Resiliency
pubcrawl
composability
Databases
tools
risk management
network attacks
Predictive Metrics
attack graph
attack graphs
MulVal
network protocols
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »