Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
web vulnerabilities
biblio
Impact of Coding Styles on Behaviours of Static Analysis Tools for Web Applications
Submitted by aekwall on Fri, 08/12/2022 - 4:09pm
static code analysis
Human behavior
composability
Resiliency
coding styles
composabiity
cross-site scripting
Electronic mail
encoding
pubcrawl
Registers
software security
static analysis
static analysis tools
tools
web vulnerabilities
biblio
FalconEye: A High-Performance Distributed Security Scanning System
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
secure practices
great precision
high-performance distributed security scanning system
human society
important transactions
input module
input source module
malicious users
open source framework
public domain software
scanner module
generic vulnerabilities scanning
sensitive data
Spider
support platform module
Vulnerability Scanning System
web applications
Web developers
web vulnerabilities
Pervasive Computing Security
Human Factors
Human behavior
Servers
Monitoring
Scalability
computer architecture
internet
Task Analysis
pubcrawl
Metrics
Resiliency
resilience
security of data
Uniform resource locators
web security
application security
common vulnerabilities test environment
conventional platform
detection systems
distributed scanning system
existing security vulnerabilities
FalconEye system
biblio
Web Covert Timing Channels Detection Based on Entropy
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
Noise measurement
Web weaknesses
web vulnerabilities
Web covert timing channels detection
Web
victim
timing channel
telecommunication traffic
telecommunication channels
system security policies
security attacks
security
Scalability
resilience
Receivers
public access permission
channel entropy
modulation
memory storage
internet
information security
entropy-based detection method
entropy threshold
Entropy
disclosure information
delays
covert storage channels
covert channels
Convert Channel
computer network security
Compositionality
communication contrary
biblio
Applications for detecting XSS attacks on different web platforms
Submitted by grigby1 on Wed, 01/16/2019 - 2:32pm
Web browser
Reactive power
Resiliency
security
security flaw
security of data
Site Intermediate Script attacks
visualization
Web application
Rails
Web Browser Security
Web platforms
web security
Web sites
web vulnerabilities
XSS attacks
XSS injection
XSS security
intrusion prevention
Compositionality
C\# languages
dynamic web pages
HTML pages
Human behavior
information security
internet
Intrusion Detection
command injection attacks
Java
malicious code worker
malicious Java Script code
Metrics
Nanoelectromechanical systems
online front-ends
programming languages
pubcrawl