Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
tools
program testing
pubcrawl
Resiliency
security vulnerability
SQL
SQL injection
SQLI
SQLi vulnerabilities
SQLMAP
privacy
Vulnerability
Vulnerability Analysis
vulnerability scanner
Web application
web applications
Web sites
websites
WordPress
Drupal website pages
Computer hacking
content management
content management systems
Cybersecurity
data confidentiality
data integrity
Data protection
Databases
Computer crime
Human behavior
internet
Joomla website pages
LAMP server
Metrics
Nikto
Penetration Testing
policy-based-governance
biblio
A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
privacy
website connected database
Web sites
vulnerabilities
tools
threats
SQL injection attack
SQL injection
SQL
specific website
Servers
retrieving sensitive information
Resiliency
real-world implementation
query processing
pubcrawl
actual website
preventive measures
policy-based-governance
open source tools
Metrics
Linux
invasive software
Human behavior
foundational cybersecurity course
executing SQL queries
enhanced cybersecurity learning
Databases
Crawlers
computer science education
Computer hacking
Acunetix
biblio
Detection of SQL injection attacks by removing the parameter values of SQL query
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
privacy
web services
web applications
tools
Structured Query Language
SQL query
SQL Injection attacks
SQL injection attackers
SQL injection attack detection method
SQL injection
SQL
Runtime
Resiliency
query processing
pubcrawl
backend database
policy-based-governance
parameter values
mobile web applications
mobile computing
Metrics
Internet users
internet
Human behavior
desktop web application
Databases
database
confidential information
Conferences
Computer crime
biblio
Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and Solutions
Submitted by grigby1 on Fri, 02/22/2019 - 3:11pm
relational database security
Trademarks
tools
static code analysis
Static Analysis Tool
static analysis
SQL
security vulnerabilities
security of data
security
scalable static analysis
Resiliency
relational databases
applications code
pubcrawl
program diagnostics
PL/SQL server stack
Metrics
low false positives
Java EE
Java
Human behavior
Databases
Conferences
composability
C/C++ systems code
biblio
T-Fuzz: Fuzzing by Program Transformation
Submitted by grigby1 on Thu, 02/14/2019 - 10:20am
program analysis
tools
taint analysis
t-fuzz approach
symbolic execution-based approach
software bugs
Software
security of data
security
randomly generated inputs
pubcrawl
program verification
program transformation
program testing
program diagnostics
program debugging
bug finding
Metrics
Libraries
input mutation techniques
input checks
fuzzing transformed programs
fuzzing
fuzzer-generated inputs
Fuzz
dynamic tracing based technique
deep execution paths
coverage-guided fuzzer
Computer bugs
composability
code paths
biblio
Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms
Submitted by grigby1 on Thu, 02/14/2019 - 10:19am
NIST post-quantum cryptography project submissions
validation tools
tools
taint analysis
static analysis
source code
quantum cryptography
pubcrawl
Proposals
program diagnostics
post-quantum cryptography algorithms
NIST post-quantum standardization project
cache storage
NIST
Metrics
leakage pattern detection
execution behavior
encryption
development cycle
dedicated vulnerability research tool
cryptographic algorithms
composability
cache-timing vulnerabilities
cache-timing attacks
biblio
A Dynamic Taint Analysis Tool for Android App Forensics
Submitted by grigby1 on Thu, 02/14/2019 - 10:19am
Humanoid robots
tools
taint analysis
real-world apps
real-world Android apps
pubcrawl
online app stores
Mobile handsets
mobile forensic toolkits
mobile device
mobile computing
Metrics
Manuals
law enforcement investigators
android
Forensics
forensic evidentiary data
dynamic Taint analysis tool
Digital Forensics
digital forensic practitioners
digital forensic
Databases
composability
benchmark apps
automated mobile app analysis tool
app-generated evidence
Androids
Android app forensics
biblio
Leveraging Historical Versions of Android Apps for Efficient and Precise Taint Analysis
Submitted by grigby1 on Thu, 02/14/2019 - 10:19am
invasive software
user apps
tools
taint checking
taint analysis
simultaneous scalability
security vulnerabilities
security
representative precise taint analysis
real-world evolving Android apps
reachability analysis
pubcrawl
Open Source Software
mobile computing
Metrics
analysis effectiveness
incremental taint analysis
incremental
historical versions
Google
EVOTAINT
Evolution
differencing
composability
Benchmark testing
attacks
Android ecosystem
Android devices
Android (operating system)
android
biblio
Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots
Submitted by grigby1 on Fri, 02/08/2019 - 3:38pm
resilience
IP networks
low interaction honeypots
low- interaction honeypot
low-interaction honeypot
operating systems
performance evaluation
Probes
pubcrawl
internet
Resiliency
Scalability
security
TCPIP
telecommunication security
tools
Windows - KFSensor
attack actions
inhibiting fingerprinting attacks
Human Factors
Human behavior
honey pots
fuzzy technique
fuzzy set theory
fingerprinting techniques
fingerprinting detection mechanism
fingerprinting attack tools
Fingerprint recognition
fingerprint low-interaction honeypots
data privacy
computer network security
completeness attack vectors
authorisation
biblio
Honeypot in the Cloud Five Years of Data Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 3:37pm
Honeypott
tools
security of data
Scalability
Resiliency
resilience
Ransomware
pubcrawl
password
Human Factors
Human behavior
Computer crime
Honeypot Results
Honeypot in the cloud
honeypot data
Honeypot Analysis
honeypot
honey pots
data analysis
cyber security
Computer hacking
« first
‹ previous
…
47
48
49
50
51
52
53
54
55
…
next ›
last »