Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SQL injection
biblio
Efficient and Flexible Discovery of PHP Application Vulnerabilities
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
PHP application vulnerabilities
web applications
vulnerability scanner
Syntactics
Structured Query Language
SQL injection
Servers
security
Scalability
Resiliency
resilience
pubcrawl
Programming Language
programming
code property graphs
PHP
Open Source Software
interprocedural analysis technique
internet
information flow analysis
Human Factors
human factor
Human behavior
graph theory
graph database
Databases
Cross Site Scripting (XSS)
Cross Site Scripting
biblio
Using Precise Taint Tracking for Auto-sanitization
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
SQL injection
Cross Site Scripting
Cross Site Scripting (XSS)
Human behavior
human factor
Human Factors
JavaScript
pubcrawl
resilience
Resiliency
Scalability
taint analysis
Web Application Security
biblio
D-ForenRIA: Distributed Reconstruction of User-Interactions for Rich Internet Applications
Submitted by grigby1 on Mon, 05/22/2017 - 2:05pm
data privacy
http traces
Human behavior
incident forensics
Metrics
privacy
pubcrawl
Resiliency
rich internet applications
SQL injection
SQL injection attack
traffic replay
user-interactions reconstruction
biblio
Hacking the DBMS to Prevent Injection Attacks
Submitted by grigby1 on Mon, 05/22/2017 - 2:04pm
data privacy
dbms self-protection
Human behavior
injection attacks
Metrics
privacy
pubcrawl
Resiliency
security
software security
SQL injection
SQL injection attack
web applications
biblio
System Attribute Measures of Network Security Analyzer
Submitted by grigby1 on Mon, 05/22/2017 - 2:04pm
network coding
URL Rewriting
SQL injection attack
SQL injection
security
Resiliency
pubcrawl
privacy
Packets
cross-site scripting
Multiple Attacks
Metrics
intrusion prevention system
intrusion detection system
Human behavior
efficiency
data privacy
biblio
Runtime Input Validation for Java Web Applications Using Static Bytecode Instrumentation
Submitted by grigby1 on Mon, 05/22/2017 - 2:04pm
bytecode instrumentation
data privacy
Human behavior
input validation
Java web application
Metrics
path traversal
privacy
pubcrawl
Resiliency
SQL injection
SQL injection attack
biblio
SOFIA: An Automated Security Oracle for Black-box Testing of SQL-injection Vulnerabilities
Submitted by grigby1 on Mon, 05/22/2017 - 2:04pm
data privacy
Human behavior
Metrics
privacy
pubcrawl
Resiliency
Security oracle
security testing
SQL injection
SQL injection attack
SQL-Injection
biblio
An analysis of XSS, CSRF and SQL injection in colombian software and web site development
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Human behavior
XSS
websites
Web sites
web security
web applications
SQL injection
SQL
software engineering
software development
Software
security protocols
Resiliency
pubcrawl
internet
Colombian companies
hacking protection
Hacking
Economics
Databases
CSRF
Cross Site Scripting attacks
Cross Site Scripting
Cross Site Request Forgery
Computer crime
composability
Colombian Web Site development
Colombian software development
Colombian organizations
file
Applying User Sessions to Detect SQL Injection Vulnerabilities in Web Applications
Submitted by akarns on Fri, 01/29/2016 - 12:50pm. Contributors:
Sreedevi Sampath
Mengzi Du
Isaiah Yoon
Abstract:
security
SQL injection
web applications
user sessions
testing
High Confidence Software and Systems Conference 2016
Poster
Posters
HCSS'16
HCSS'16 Poster Session
biblio
#x201C;Role of metadata in forensic analysis of database attacks #x201C;
Submitted by BrandonB on Wed, 05/06/2015 - 1:55pm
fraudulent transaction
trail obfuscation
table storage
SQL injection
security issue
reconnaissance attack
privacy issue
open source database forensics tool
online activities
metadata
meta data
linked hash technique
Law
information retrieval
Information analysis
Handheld computers
anti-forensics attacks
forensic analysis
e-transactions
digital notarization
Digital Forensics
digital evidence
database server artifacts
database security breaches
database forensics
database attacks
data privacy
court of law
Conferences
cache
audit logs
antiforensics attacks
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »