Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Browser Security
biblio
Blockchain-based open infrastructure for URL filtering in an Internet browser
Submitted by grigby1 on Tue, 04/27/2021 - 2:15pm
Metrics
URL filtering
optimum block size
Internet security
Uniform resource locators
Synchronization
Browser Security
Compositionality
Browsers
Organizations
smart contracts
blockchain
Prototypes
internet
Resiliency
resilience
Human behavior
pubcrawl
biblio
Information Security in M-learning Systems: Challenges and Threats of Using Cookies
Submitted by grigby1 on Tue, 04/27/2021 - 2:15pm
tools
privacy
pubcrawl
Human behavior
resilience
Resiliency
information security
Metrics
Browsers
Compositionality
Mobile handsets
Browser Security
Electronic learning
cookies
m-learning
biblio
2020 8th International Symposium on Digital Forensics and Security (ISDFS)
Submitted by grigby1 on Tue, 04/27/2021 - 2:14pm
pubcrawl
Human behavior
resilience
Resiliency
Metrics
Compositionality
bitcoin
Browser Security
cryptojacking
Coin Mining
Coinhive
cryptocurrency mining
Hidden Cryptocurrency Mining
biblio
Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers
Submitted by grigby1 on Tue, 04/27/2021 - 2:14pm
security
pubcrawl
Human behavior
resilience
Resiliency
Ecosystems
privacy
Metrics
Browsers
Compositionality
Browser Security
Google
Web servers
biblio
Web Browser Extension User-Script XSS Vulnerabilities
Submitted by grigby1 on Tue, 04/27/2021 - 2:14pm
Human behavior
Web Browser Security
Vulnerability
security
Resiliency
resilience
pubcrawl
plugin
Metrics
Autonomic Security
extension
exploit
Ecosystems
Compositionality
Browsers
Browser Security
browser
Big Data
biblio
Hardening Firefox against Injection Attacks
Submitted by grigby1 on Wed, 02/10/2021 - 1:22pm
real-world security vulnerabilities
user interfaces
Web pages
Browser Security
information retrieval
CSS
Firefox
Hardening
injection attacks
HTML
Universal Cross-site Scripting
untrusted Web content
user interface
Web browsers display content
web security
Web security model
Cross Site Scripting
online front-ends
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
internet
Runtime
security of data
JavaScript
World Wide Web
authoring languages
Browsers
operating systems
Web sites
hypermedia markup languages
biblio
An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks
Submitted by grigby1 on Wed, 02/03/2021 - 2:01pm
Intrusion Detection
wrapping attacks
Virtual machining
specific honey pot algorithm
Servers
security issues
security
Scalability
Resiliency
resilience
pubcrawl
procedural intrusion way
malware
invasive software
Intrusion Detection Systems
Browser Security
intrusion
Human Factors
Human behavior
honey pots
honey pot attack
Honey pot (computing)
Honey Pot
Flooding Attacks
common security breaches
cloud computing security attacks
Cloud Computing
browser malware-injection attacks
authentication
attacks
biblio
Vulnerability Discovery Modelling With Vulnerability Severity
Submitted by grigby1 on Fri, 09/11/2020 - 11:58am
risk analysis
Web browser
vulnerability severity
vulnerability discovery rate
vulnerability discovery process
vulnerability discovery models highlight
vulnerability discovery modelling
Vulnerability discovery model
vulnerability data
vulnerabilities
severity
predictive capability
Browser Security
Compositionality
Browsers
security of data
online front-ends
software vulnerabilities
composability
software fault tolerance
Data models
Mathematical model
Analytical models
Software
resilience
Metrics
Human behavior
pubcrawl
security
Predictive models
biblio
An Overview of Security in CoAP: Attack and Analysis
Submitted by grigby1 on Fri, 09/11/2020 - 11:58am
network servers
Constrained Application Protocol (CoAP)
Copper
cross-protocol attacks
datagram transport layer security
Datagram Transport Layer Security (DTLS)
denial of service
Denial of Service (DoS) attacks
DoS
DTLS
man-in-the-middle attack
CoAP security attack
peak security issues
proxy
Relay Attacks
replay attacks
request for comments 7252
RFC 7252
smart ecosystems
UDP
User Datagram Protocol (UDP)
Web transfer protocols
secure protocol
Internet of Things
security
Servers
pubcrawl
Human behavior
Metrics
resilience
IoT devices
telecommunication security
Protocols
computer architecture
composability
Browsers
Compositionality
Browser Security
authentication mechanism
Constrained Application Protocol
Internet of Things (IoT)
application layer protocol
channel security
client-server architecture
biblio
Fidelius: Protecting User Secrets from Compromised Browsers
Submitted by grigby1 on Fri, 09/11/2020 - 11:58am
fully malicious environment
Browser Security
Keyboards
browser window
Browser-Security
client-side privacy measures
compromised browsers
credit card numbers
Fidelius
user interfaces
Hardware-enclave
Malware-protection
page load
Trusted-I/O
user interaction
user secret protection
web browsing sessions
security of data
operating systems (computers)
Compositionality
Browsers
side-channel attacks
malware
online front-ends
composability
sensitive data
data privacy
Hardware
resilience
Metrics
Human behavior
pubcrawl
Servers
« first
‹ previous
1
2
3
4
5
next ›
last »