Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SQL injection
biblio
Intrusion Detection Using Swarm Intelligence
Submitted by aekwall on Mon, 01/27/2020 - 10:26am
random neural network based system
mean squared error
multilayer perceptrons
Neural networks
Neurons
NSL-KDD
NSL-KDD Train
particle swarm optimization
Prediction algorithms
pubcrawl
mean square error methods
recurrent neural nets
Recurrent neural networks
RNN-ABC
sensitive information
SQL
SQL injection
Swarm Intelligence
Training
hybrid multilayer perceptron based intrusion detection system
Artificial Bee Colony
artificial bee colony algorithm
Biological neural networks
communication technologies
composability
Compositionality
computer network security
Cyber Attacks
Denial-of-Service
anomaly-based intrusion detection scheme
insecure channel
Internet of Things
Internet-of-Things devices
Intrusion Detection
IoT device
IoT security
learning (artificial intelligence)
man-in-middle
biblio
Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques
Submitted by grigby1 on Thu, 09/26/2019 - 10:25am
resilience
tools
Text Mining
standards
SQL injection vulnerabilities
SQL injection
SQL
source code (software)
software vulnerabilities
Software
singular decision trees
security of data
security
Secure Coding
Safe Coding
Resiliency
code analysis
Python
pubcrawl
program diagnostics
policy-based governance
natural language techniques
natural language processing
Metrics
Java program
Java byte code
Java
Human Factors
Human behavior
Decision trees
collaboration
code analysis tools
biblio
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
tools
program testing
pubcrawl
Resiliency
security vulnerability
SQL
SQL injection
SQLI
SQLi vulnerabilities
SQLMAP
privacy
Vulnerability
Vulnerability Analysis
vulnerability scanner
Web application
web applications
Web sites
websites
WordPress
Drupal website pages
Computer hacking
content management
content management systems
Cybersecurity
data confidentiality
data integrity
Data protection
Databases
Computer crime
Human behavior
internet
Joomla website pages
LAMP server
Metrics
Nikto
Penetration Testing
policy-based-governance
biblio
A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
privacy
website connected database
Web sites
vulnerabilities
tools
threats
SQL injection attack
SQL injection
SQL
specific website
Servers
retrieving sensitive information
Resiliency
real-world implementation
query processing
pubcrawl
actual website
preventive measures
policy-based-governance
open source tools
Metrics
Linux
invasive software
Human behavior
foundational cybersecurity course
executing SQL queries
enhanced cybersecurity learning
Databases
Crawlers
computer science education
Computer hacking
Acunetix
biblio
Detection of SQL injection attacks by removing the parameter values of SQL query
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
privacy
web services
web applications
tools
Structured Query Language
SQL query
SQL Injection attacks
SQL injection attackers
SQL injection attack detection method
SQL injection
SQL
Runtime
Resiliency
query processing
pubcrawl
backend database
policy-based-governance
parameter values
mobile web applications
mobile computing
Metrics
Internet users
internet
Human behavior
desktop web application
Databases
database
confidential information
Conferences
Computer crime
biblio
Real-time ETL in Striim
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
Resiliency
Human behavior
pubcrawl
privacy
Metrics
SQL injection
data validation
ETL
real-time
policy-based-governance
biblio
Efficient Astronomical Query Processing Using Spark
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
Resiliency
Human behavior
pubcrawl
privacy
Metrics
SQL injection
astronomical survey data management
Big Data
query processing
spark framework
policy-based-governance
biblio
WOVSQLI: Detection of SQL Injection Behaviors Using Word Vector and LSTM
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
threat vectors
Human behavior
LSTM networks
Metrics
policy-based-governance
privacy
pubcrawl
Resiliency
SQL injection
SQL injection detection
SQL token word vector
biblio
SQL Injection Attack Principles and Preventive Techniques for PHP Site
Submitted by aekwall on Mon, 02/25/2019 - 11:38am
Resiliency
Human behavior
pubcrawl
privacy
Metrics
injection detection
PHP injection
PHP injection prevention
PHP site
SQL injection
SQL injection prevention
policy-based-governance
biblio
Formulation of SQL Injection Vulnerability Detection as Grammar Reachability Problem
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
Access Control
Compositionality
cross-site scripting
flow graphs
Grammar
Human behavior
Metrics
Production
pubcrawl
reachability analysis
Resiliency
SQL injection
static analysis
vulnerabilities detection
vulnerability detection
Web application
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »