Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SQL injection
biblio
Multi-source Data Analysis and Evaluation of Machine Learning Techniques for SQL Injection Detection
Submitted by grigby1 on Mon, 12/10/2018 - 11:39am
composability
defense
machine learning
Metrics
network intrusion detection
pubcrawl
resilience
Resiliency
SQL injection
Zero day attacks
biblio
An Emulation of Sql Injection Disclosure and Deterrence
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
password
Web applications authorization
Web applications authentication
web applications
SQL injection disclosure
SQL injection deterrence
SQL injection
SQL
security vulnerability
Scalability
Resiliency
resilience
pubcrawl
password security
authentication
message authentication
internet
information retrieval
Human Factors
honey pots
Honey pot mechanism
Honey Pot
Heisenberg analysis
Databases
data retrieval
Companies
authorisation
biblio
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
SQL injection attack
pubcrawl
receiver operating characteristic curve
Resiliency
ROC curve
secure backend storage
security
security of data
smart devices
SQL
SQL injection
privacy
SQLIA
SQLIA big data
SQLIA Data analytics
SQLIA hashing
SQLIA Pattern-driven data set
Structured Query Language
structured query language injection attack
supervised learning
supervised learning model
Support vector machines
IoT
back-end database
Big Data
Cloud Computing
cloud-hosted Web applications
collaboration
confidential data
Data mining
Data models
Human behavior
Internet of Things
Artificial Intelligence
learning (artificial intelligence)
learning automata
Microsoft Azure Machine Learning
ML algorithms
pattern classification
pattern-driven corpus
Policy
policy-based governance
Policy-Governed Secure Collaboration
Predictive Analytics
biblio
Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
SQL injection
privacy
program testing
pubcrawl
Regular Expression Inference
Resiliency
search problems
software maintenance
SQL
Policy-Governed Secure Collaboration
SQL Injection attacks
testing
vulnerabilities detection
vulnerable WAFs
WAF rule set
web application firewalls
Web application firewalls repair
web security
Human behavior
collaboration
combinatorial mathematics
combinatorial optimisation problem
Decision trees
filter rules
firewalls
Firewalls (computing)
genetic algorithms
Automated Testing
internet
learning (artificial intelligence)
legitimate requests
machine learning
multiobjective genetic algorithms
Policy
policy-based governance
biblio
A hybrid method for detection and prevention of SQL injection attacks
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
serious security threat
Policy-Governed Secure Collaboration
Prevention
privacy
pubcrawl
Resiliency
Runtime
security of data
sensitive information
policy-based governance
Servers
SQL
SQL injection
SQL injection attack
SQL statements
SQLIA
static
web applications
detection
collaboration
common gateway interface
Computer hacking
Data mining
database design
database driven web applications
database management systems
Databases
access content
dynamic
Hacker
Human behavior
hybrid method
hybrid SQLIA
internet
Policy
biblio
Result evaluation of field authentication based SQL injection and XSS attack exposure
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
Servers
policy-based governance
Policy-Governed Secure Collaboration
privacy
profited businesses
pubcrawl
Resiliency
security imperatives
security issues
Policy
SQL
SQL infusion
SQL injection
Structured Query Language
web based business
web communications
Web sites
XSS attack exposure
document processing
centralized mechanism
collaboration
Computer crime
Cross Site Scripting (XSS)
cross webpage scripting
cross-site scripting
data trades
Databases
authentication
electronic framework association
electronic frameworks
field authentication
framework
Human behavior
information classification
message authentication
pattern classification
biblio
SQL injection attack detection using fingerprints and pattern matching technique
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
Policy
Web-based applications
String Search
SQL queries
SQL injection detection approaches
SQL Injection attacks
SQL injection attack detection framework
SQL Injection Attack Detection
SQL injection
SQL
Resiliency
pubcrawl
programming
privacy
Policy-Governed Secure Collaboration
policy-based governance
attack signatures
pattern matching technique
pattern matching
password
OWASP
Open Web Application Security Project Top Ten Cheat sheet
intranet
internet
Human behavior
fingerprinting method
Fingerprint recognition
fingerprint method
Engines
Databases
computer network security
collaboration
biblio
Collaborative SQL-injections Detection System with Machine Learning
Submitted by grigby1 on Thu, 06/07/2018 - 3:12pm
security
privacy
pubcrawl
Human behavior
attack
Resiliency
Policy
collaboration
SQL injection
Policy-Governed Secure Collaboration
policy-based governance
internet
machine learning classification
SQLIA
Training data
biblio
Testing Techniques and Analysis of SQL Injection Attacks
Submitted by grigby1 on Thu, 05/24/2018 - 12:08pm
SQL Injection vulnerability
resilience
Resiliency
security of data
security systems
security testing
sensitive data
sensitive information
SQL
SQL injection
SQL Injection attacks
SQL injection problems
relational databases
SQL query
testing techniques
three-tier-architecture
traditional security policies
user interfaces
users
Web application vulnerabilities
web applications
Web sites
website
handy interface
attackers
Cogeneration
commonly used Web application attacks
composability
Data protection
database-driven Web applications
DH-HEMTs
different security systems
effective data protection systems
good target
governmental organizations
attack
Human behavior
integrated circuits
internet
Knowledge engineering
Metrics
penetration testing technique
program testing
proper data protection
pubcrawl
relational database security
biblio
A multilevel system to mitigate DDOS, brute force and SQL injection attack for cloud security
Submitted by grigby1 on Wed, 02/21/2018 - 1:42pm
SQL injection
Agent
Brute force
CFG
DDoS
Force
IP networks
Network Security Architecture
password
pubcrawl
resilience
Resiliency
Servers
vpn
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »