Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SQL injection
biblio
SQL Injection Attack and Detection Based on GreenSQL Pattern Input Whitelist
Submitted by grigby1 on Mon, 03/15/2021 - 1:08pm
Resiliency
internet technology
IP networks
Metrics
optimized whitelist
Pattern
patterned input
pubcrawl
resilience
internet
SQL
SQL injection
SQL injection attack
SQL injection attack command
Whitelist
Whitelists
working mode
Big Data
intercept samples
input model
Information systems
GreenSQL pattern input whitelist
GreenSQL learning
GreenSQL database firewall
GreenSQL
Firewalls (computing)
firewalls
Databases
database protection
database management systems
dangerous threat
composability
command injection attacks
biblio
An Analysis of Effectiveness of Black-Box Web Application Scanners in Detection of Stored SQL Injection and Stored XSS Vulnerabilities
Submitted by grigby1 on Wed, 02/10/2021 - 1:22pm
Black-box scanners
Cross Site Scripting
cross-site scripting
Databases
Human behavior
Manuals
Payloads
pubcrawl
resilience
Resiliency
Scalability
SQL injection
stored SQLI
Stored XSS
Uniform resource locators
Web pages
biblio
An Automated Composite Scanning Tool with Multiple Vulnerabilities
Submitted by aekwall on Mon, 09/28/2020 - 12:34pm
system vulnerabilities
Cross Site Scripting
vulnerability detection module
the vulnerability detection module
multiple vulnerabilities
frequent vulnerabilities
directory traversal
composite detection tool
automated composite scanning tool
Cross-site Scripting Attacks
computer network security
detection method
network security protection
SQL
SQL injection
pubcrawl
Human behavior
Resiliency
network security
Scalability
biblio
A Survey on Vulnerability Assessment Penetration Testing for Secure Communication
Submitted by aekwall on Mon, 09/28/2020 - 12:33pm
software security
Cross Site Scripting
Vulnerability Assessment and Penetration Testing (VAPT)
security patches
Security Misconfiguration
security loopholes
security hacking activities
Internet application
cyber threat
Cross-site scripting (XSS)
broken authentication
communication security
Web Application Security
vulnerability assessment
Scalability
program testing
Penetration Testing
cross-site scripting
tools
internet
Databases
Computer crime
SQL injection
pubcrawl
Human behavior
Resiliency
Organizations
biblio
Data Security in cloud computing using Hierarchical CP-ABE scheme with scalability and flexibility
Submitted by grigby1 on Fri, 07/24/2020 - 12:49pm
fine grained access control
SQL injection attack
SQL injection
scalable access control
Scalability
quality of service
pubcrawl
policy-based governance
Organizations
KP-ABE
key policy attribute based encryption
hierarchical CP-ABE scheme
Hierarchical CP-ABE
Attribute key
encryption
Data Security
Cryptography
CP-ABE
collaboration
cloud service provider
Cloud Computing
CipherText Policy Attribute Based Encryption
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorization mechanisms
authorization
authorisation
biblio
High-risk Problem of Penetration Testing of Power Grid Rainstorm Disaster Artificial Intelligence Prediction System and Its Countermeasures
Submitted by aekwall on Mon, 06/01/2020 - 10:54am
resilience
power engineering computing
power grid rainstorm disaster artificial intelligence prediction system
power grid storm disasters
power grids
power Internet of Things
power meteorological service technology support
power system security
power transformer testing
program debugging
pubcrawl
policy-based governance
Resiliency
security of data
SQL
SQL blind bug
SQL injection
SQL injection attack behavior
SQL injection penetration test
Storms
system penetration testing
Vulnerability
host security
Artificial Intelligence
artificial storm prediction system
Companies
composability
disaster prediction information systems
disasters
electric power information system security defense work
electrical safety
energy Internet disaster safety
energy internet disaster security
application security
information security
Information systems
internet
Internet of Things
middleware
middleware security
network security
password
Penetration Testing
PGRDAIPS
biblio
Impact of SQL Injection in Database Security
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
public key cryptography
world web applications
hybrid encryption
Elliptical Curve Cryptography
database information
dangerous hacking technique
cracking technique
Database Security
AES
relational database security
ECC
relational databases
Elliptic curve cryptography
authorisation
SQL injection attack
SQL
Databases
SQL injection
standards
Metrics
composability
pubcrawl
Human behavior
Resiliency
advanced encryption standard
encryption
biblio
DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development
Submitted by grigby1 on Mon, 02/10/2020 - 11:36am
program diagnostics
Tainted data flow
static code analysis
static analysis-based security analysis approach
static analysis plugin
static analysis
SQL injection
software engineering
Software
security of data
Secure Software Development
Resiliency
resilience
pubcrawl
android
password
mobile software development
mobile computing
Mobile Applications
leak detection
Human Factors
Human behavior
Handheld computers
DroidPatrol
Conferences
computer science education
composability
Android Development Studio
biblio
A Machine Learning Based Approach to Identify SQL Injection Vulnerabilities
Submitted by grigby1 on Mon, 02/10/2020 - 11:27am
collaboration
deep learning
Human behavior
Metrics
policy-based governance
prediction model
privacy
pubcrawl
resilience
Resiliency
SQL detection
SQL injection
Vulnerability
biblio
Automated Combinatorial Testing for Detecting SQL Vulnerabilities in Web Applications
Submitted by grigby1 on Mon, 02/10/2020 - 11:27am
privacy
web applications
tools
Syntactics
SQL vulnerabilities detection
SQL injection vulnerabilities
SQL injection
SQL detection
SQL database backend
SQL
security testing
security of data
Resiliency
resilience
pubcrawl
program testing
attack grammars
policy-based governance
Metrics
internet
Human behavior
gray-box testing method
gray-box testing
Grammar
Databases
concrete attack vectors
combinatorial testing methodology
combinatorial testing
collaboration
automated SQL injection vulnerability testing
automated combinatorial testing
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »