Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Towards an FPGA-based network layer filter for the Internet of Things edge devices
Submitted by grigby1 on Thu, 04/20/2017 - 11:40am
IPv6
system-on-chip implementation
system-on-chip
security
Scalability
Resiliency
pubcrawl
personal area networks
Packet Filter
network on chip security
network on chip
low-power resource constrained devices
IPv6 Link-local address calculator
6LoWPAN
Internet-of-Things (IoT)
Internet of Things edge devices
Internet of Things
IEEE 802.15.4 radio modules
FPGA-based network layer filter
FPGA
Filters
field programmable gate arrays
Contiki-OS
composability
6LoWPAN adaptation layer
biblio
A New Cross-Site Scripting Detection Mechanism Integrated with HTML5 and CORS Properties by Using Browser Extensions
Submitted by grigby1 on Thu, 04/20/2017 - 11:38am
Human behavior
XSS attack detection
web security
Uniform resource locators
Servers
security of data
security
Resiliency
pubcrawl
OWASP
malware
hypermedia markup languages
browser extension
HTML5
Databases
Cross-site scripting (XSS)
cross-site scripting detection mechanism
Cross Site Scripting
cross origin resource shearing (CORS)
CORS
composability
Browsers
browser extensions
biblio
Automated white-list learning technique for detection of malicious attack on web application
Submitted by grigby1 on Thu, 04/20/2017 - 11:38am
Logic gates
XSS attack
XML
Web Application Security
WAMG(Web Application Model Generator)
Structured Query Language
Standards organizations
SQL injection attack
semistructured XML case generation
security of data
security
Resiliency
pubcrawl
Organizations
malicious attack detection
maintenance engineering
automated white-list learning technique
learning (artificial intelligence)
internet
Human behavior
HTTP response splitting attack
HTTP request splitting attack
Generators
extensible markup language
Default Deny model(White Listing)
Default allow model (Black Listing)
default allow model
cross site scripting attack
Cross Site Scripting
composability
Buffer overflow attack
biblio
Automatic generation of Content Security Policy to mitigate cross site scripting
Submitted by grigby1 on Thu, 04/20/2017 - 11:38am
JavaScript
XSS
Web server layer
Web attack mitigation
Web attack detection
Web application
URL
Uniform resource locators
static contents
Servers
security policies
security of data
security
Resiliency
pubcrawl
Algorithm design and analysis
Java
internet
information technology
Human behavior
HTML
Databases
CSP mechanism
CSP
cross-site scripting mitigation
Cross Site Scripting
Cross Layer Security
composability
client-side security layer
automatic content security policy generation
biblio
Cyber security analysis using vulnerability assessment and penetration testing
Submitted by grigby1 on Thu, 04/20/2017 - 11:38am
Penetration Testing
vulnerability assessment and penetration testing techniques
Vulnerability Assessment and Penetration Testing (VAPT)
vulnerability assessment
VAPT
testing
Technological innovation
technical assets
Sql Injection (SQLi)
security patches
security of data
security loopholes
security
Resiliency
pubcrawl
Browsers
Organizations
Market research
Human behavior
hacking activities
date security measurement
cyber-attacks
cyber threats
cyber security awareness
cyber security analysis
cyber security
Cross-site scripting (XSS)
Cross Site Scripting
Conferences
composability
biblio
Detection of SQL injection and XSS attacks in three tier web applications
Submitted by grigby1 on Thu, 04/20/2017 - 11:38am
Resiliency
Web servers
Web Security Vulnerability
Virtualization
Three Tier Web Application
Static Web Application (SWA)
SQL injection attack
Skeleton
security
composability
pubcrawl
Intrusion Detection System (IDS)
Human behavior
Dynamic Web Application (DWA)
Databases
Cross Site Scripting (XSS)
Cross Site Scripting
biblio
Demonstrating Context-Aware Services in the Mobility First Future Internet Architecture
Submitted by grigby1 on Thu, 04/20/2017 - 11:33am
clean slate
collaboration
computer architecture
Context
Context Service
Future Internet Architectures
Human behavior
internet
Metrics
multicast
Prototype Demo
pubcrawl
Resiliency
Routing protocols
security
Software
biblio
Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations
Submitted by grigby1 on Thu, 04/20/2017 - 11:29am
partial attestation
Virtualization
Trusted Computing
Software measurement
security requirements
security
Seals
Resiliency
pubcrawl
privacy-preserving remote attestations
attestation
Metrics
Kernel
data privacy
cost-effective remote attestations
Cloud Computing
chain of trust
attestation protocol
attestation costs
biblio
XEBRA: XEn Based Remote Attestation
Submitted by grigby1 on Thu, 04/20/2017 - 11:29am
XEn based remote attestation
remote host
remote computing device
remote machines
Resiliency
security
security of data
software based remote attestation technique
Trusted Computing
Virtualization
XEBRA
pubcrawl
attestation
code security
embedded platforms
embedded systems
Hardware
Intel Galileo board
Memory management
Metrics
performance evaluation
Protocols
biblio
Reading Between the Fields: Practical, Effective Intrusion Detection for Industrial Control Systems
Submitted by grigby1 on Mon, 04/03/2017 - 10:54am
pubcrawl
ICS Anomaly Detection
networked control systems
network intrusion detection
Anomaly Detection
network control systems security
network control systems
Metrics
Intrusion Detection Systems
security
Scalability
Resiliency
intrusion detection system
Industrial Control Systems
IDS
« first
‹ previous
…
395
396
397
398
399
400
401
402
403
…
next ›
last »