Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: An Urgent Need for Systematic Security Regression Testing
Submitted by BrandonB on Tue, 05/05/2015 - 9:44am
security
XSS vector testing
XSS
Web browser attack surface
web applications
Web
Vectors
testing
systematic security regression testing
security of data
browser
regression analysis
Regression
Payloads
online front-ends
Mobile communication
HTML
cross-site scripting
Browsers
biblio
Browser's defenses against reflected cross-site scripting attacks
Submitted by BrandonB on Tue, 05/05/2015 - 9:44am
online Web applications
XSS-Me
XSS filters
XSS attack
Web browsers
Web based attack
Thyristors
security of data
security
Reflected XSS
reflected cross-site scripting attacks
attacker
online front-ends
Mozilla Firefox 27
JavaScript
Internet Explorer 11
Google Chrome 32
filter
exploit
bypass
Browsers
biblio
Enhanced browser defense for reflected Cross-Site Scripting
Submitted by BrandonB on Tue, 05/05/2015 - 9:42am
security
XSS-Me
XSS attack
XSS
Web sites
Web page
Web browser
vulnerable Web application
Vectors
unfiltered reflection
testing
special characters
sophisticated attack
sensitive information
security of data
Attack vectors
search engines
reflected XSS vulnerability
reflected cross-site scripting
open source Mozilla Firefox security extension
online front-ends
malicious script
malicious input
Information filters
HTML
filter
enhanced browser defense
defense
client-side solution
Browsers
biblio
ETSSDetector: A Tool to Automatically Detect Cross-Site Scripting Vulnerabilities
Submitted by BrandonB on Tue, 05/05/2015 - 9:41am
interactivity
XSS attacks
web applications
vulnerabilities
testing
security of data
security
Qualifications
internet
Browsers
interactive systems
Filling
ETSSDetector
ETSS Detector
Databases
Data mining
cross-site scripting vulnerabilities
cross-site scripting
biblio
A context-sensitive approach for precise detection of cross-site scripting vulnerabilities
Submitted by BrandonB on Tue, 05/05/2015 - 9:41am
precise detection
XSS vulnerability
XSS attacks
Web application
vulnerability detection
taint analysis
standards
source code (software)
source code
software development life cycle
Software
social communication
Servers
sensitive information
security
Browsers
malware
malicious user
malicious operation
invasive software
internet
hypermedia markup languages
HTML
health services
financial transaction
defensive programming based HTML context-sensitive approach
cross-site scripting vulnerability
cross-site scripting
Context
biblio
VirtueMAN: A software-defined network architecture for WiFi-based metropolitan applications
Submitted by BrandonB on Tue, 05/05/2015 - 9:22am
QoS
wireless LAN
wireless access point
WiFi-based metropolitan application
VirtueMAN
telecommunication traffic
software-defined network architecture
software defined networking
security
SDN-based network architecture
quality of service
authentication
Protocols
Mobile communication
IP-independent forwarding scheme
intranetwork distributed cross-layer traffic control protocol
internet
IEEE 802.11 Standards
Heart beat
distributed network-wide controller
configurable user access control
authorisation
biblio
Countermeasures to Enhance Cyber-physical System Security and Safety
Submitted by BrandonB on Tue, 05/05/2015 - 9:21am
deception attack detection
smart sensors
security of data
security
safety instrumented systems
Safety
Robot sensing systems
process control
ISA-84
intelligent checkers
intelligent checker
integrated circuits
IC
fault diagnosis
anomaly detection technique
data integrity
cyber-physical systems
cyber-physical system security
cyber-physical system safety
cyber-attacks
cross-correlator
CPS security countermeasures
CPS safety protection layers
CPS safety integrity level
CPS failure mitigation
CPS failure detection
catastrophic failures
biblio
A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT)
Submitted by BrandonB on Tue, 05/05/2015 - 9:21am
eavesdropper
telecommunication security
signal processing applications
signal processing
security codes
security code
security
secure communication systems
physical layer security
OFDM
Mobile communication
flip-flops
error-free legitimate channel
codes
distortion
distort signal parameter
discrete fractional Fourier fransform
Discrete Fourier transforms
DFRFT
crosslayer
cross-layer strong mobile communication secure model
cross-layer secure communication model
cross-layer DFRFT security communication model
cross-layer
Constellation diagram
biblio
Monitoring Security Compliance of Critical Processes
Submitted by BrandonB on Tue, 05/05/2015 - 9:20am
predictive security analysis
security policies
security monitoring
security modeling and simulation
security information and event management
security compliance
security
Runtime
process-aware information systems
process specifications
process behavior model
process behavior analysis
automata
Predictive models
power system security
operational formal models
Monitoring
model-based support
hydroelectric power stations
hydroelectric power plant
critical processes
critical infrastructures
Computational modeling
Business
biblio
Security attack mitigation framework for the cloud
Submitted by BrandonB on Tue, 05/05/2015 - 9:17am
security guarantee
Markov processes
mean time to security failure
MTTSF cloud
privacy losses
private data security
resource consolidation
security
Security Administration
security attack mitigation framework
Markov model
security of data
Silicon
software products
software vulnerabilities
software vulnerability exploits
virtual machine
Virtual machining
virtualisation
virtualization technology
customer trust
attack mitigation plan
availability parameter
business data leaks
Cloud Computing
cloud resource manager
cloud service
Companies
confidentiality parameter
cross-channel attacks
attack graphs
enterprise cloud computing
enterprise cloud solutions
enterprise IT infrastructure
enterprise wide information processing system
hacking techniques
information technology
integrity parameter
markov chain
« first
‹ previous
…
423
424
425
426
427
428
429
430
431
…
next ›
last »