Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Databases
biblio
A New Cross-Site Scripting Detection Mechanism Integrated with HTML5 and CORS Properties by Using Browser Extensions
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Human behavior
XSS attack detection
web security
Uniform resource locators
Servers
security of data
security
Resiliency
pubcrawl
OWASP
malware
hypermedia markup languages
browser extension
HTML5
Databases
Cross-site scripting (XSS)
cross-site scripting detection mechanism
Cross Site Scripting
cross origin resource shearing (CORS)
CORS
composability
Browsers
browser extensions
biblio
Automatic generation of Content Security Policy to mitigate cross site scripting
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
JavaScript
XSS
Web server layer
Web attack mitigation
Web attack detection
Web application
URL
Uniform resource locators
static contents
Servers
security policies
security of data
security
Resiliency
pubcrawl
Algorithm design and analysis
Java
internet
information technology
Human behavior
HTML
Databases
CSP mechanism
CSP
cross-site scripting mitigation
Cross Site Scripting
Cross Layer Security
composability
client-side security layer
automatic content security policy generation
biblio
Detection of SQL injection and XSS attacks in three tier web applications
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Resiliency
Web servers
Web Security Vulnerability
Virtualization
Three Tier Web Application
Static Web Application (SWA)
SQL injection attack
Skeleton
security
composability
pubcrawl
Intrusion Detection System (IDS)
Human behavior
Dynamic Web Application (DWA)
Databases
Cross Site Scripting (XSS)
Cross Site Scripting
biblio
Effect of data size on performance of free-text keystroke authentication
Submitted by grigby1 on Wed, 03/08/2017 - 2:47pm
imposter pass rate
testing
test sample size
standards
reference profile size
public datasets
pubcrawl170115
physiological traits
keystroke data
Keyboards
IPR
intellectual property
authentication
free-text keystroke authentication
FAR
false alarm rate
Distance measurement
Databases
data size
biometrics (access control)
bioinformatics
behavioral biometric
authorisation
authentication performance
biblio
Keystroke dynamics performance enhancement with soft biometrics
Submitted by grigby1 on Wed, 03/08/2017 - 2:47pm
authentication
behavioural biometric modality
behavioural sciences computing
biometric characteristics
biometrics (access control)
classification approach
combination approach
Databases
feature extraction
keystroke dynamics performance enhancement
pubcrawl170115
soft biometrics
Support vector machines
timing
biblio
Score normalization for keystroke dynamics biometrics
Submitted by grigby1 on Wed, 03/08/2017 - 2:45pm
ink identification
thresholding techniques
target-dependent score normalization techniques
standards
score normalization analysis
pubcrawl170115
Protocols
pen verifier
keystroke dynamics recognition systems
keystroke dynamics biometrics
keystroke dynamics authentication systems
authentication
image segmentation
hyperspectral analysis
handwritten document analysis
handwritten character recognition
Forensics
feature extraction
Databases
biometrics (access control)
behavioral biometric recognition systems
authorisation
biblio
The Design of Brand Cosmetics Anti-counterfeiting System Based on RFID Technology
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
RFID technology
nonsecurity phenomena
product logistics information tracing
product logistics information tracking
production engineering computing
pubcrawl170112
Radiation detectors
radiofrequency identification
RFID (Radio Frequency Identification) technology
luxury cosmetics brand
sales methods
security
supply chain channels
supply chain management
supply chains
system-EPC system
visual information management system
analysis and design
information management
hard security phenomena
gray goods
false security phenomena
fake goods
distributed RFID tracking
digital authentication security technology
Databases
counterfeit goods
cosmetics brand distribution channels
cosmetics
cosmetic
brand cosmetics anticounterfeiting system
authentication
anticounterfeiting security system
biblio
A Mixed and Batching Authentication Protocol for Grouped Tags in Mobile RFID System
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
Mobile communication
Wireless communication
tracking attack
Servers
security and privacy
reply attack
radiofrequency identification
pubcrawl170112
Protocols
mutual authentication
mobile RFID system
Mobile RFID
mobile radio frequency identification
authentication
mixed authentication protocol
low cost tags
lightweight authentication
Lightweight
impersonation attack
hash based authentication
Grouping
grouped tags
Databases
Cryptographic Protocols
batching authentication protocol
biblio
Object event visibility for anti-counterfeiting in RFID-enabled product supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
object-centric coding mechanism
track-and-trace
taxonomy
system architecture framework
supply chains
supply chain management
Supply Chain
security measures
security
RFID-enabled product supply chain visibility
radiofrequency identification
pubcrawl170112
production engineering computing
anti-counterfeiting
object-based event “pedigree”
object event visibility
event pedigree
event exception detection
EPC-based events
Engines
e-pedigree
dynamically updated e-pedigree
Databases
counterfeiting activities
counterfeiting
anticounterfeiting
biblio
System security engineering vulnerability assessments for mission-critical systems and functions
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
supply chains
vulnerability identification
vulnerability assessment
US Department of Defense
testing
Systems engineering and theory
systems engineering
system security engineering vulnerability assessments
system security engineering
system security
system maturity points
Databases
Software
security of data
security
pubcrawl170112
mission-critical systems
mission-critical functions
military computing
DoD
Department of Defense
defense systems
« first
‹ previous
…
30
31
32
33
34
35
36
37
38
…
next ›
last »