Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
policy-based-governance
biblio
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
tools
program testing
pubcrawl
Resiliency
security vulnerability
SQL
SQL injection
SQLI
SQLi vulnerabilities
SQLMAP
privacy
Vulnerability
Vulnerability Analysis
vulnerability scanner
Web application
web applications
Web sites
websites
WordPress
Drupal website pages
Computer hacking
content management
content management systems
Cybersecurity
data confidentiality
data integrity
Data protection
Databases
Computer crime
Human behavior
internet
Joomla website pages
LAMP server
Metrics
Nikto
Penetration Testing
policy-based-governance
biblio
A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
privacy
website connected database
Web sites
vulnerabilities
tools
threats
SQL injection attack
SQL injection
SQL
specific website
Servers
retrieving sensitive information
Resiliency
real-world implementation
query processing
pubcrawl
actual website
preventive measures
policy-based-governance
open source tools
Metrics
Linux
invasive software
Human behavior
foundational cybersecurity course
executing SQL queries
enhanced cybersecurity learning
Databases
Crawlers
computer science education
Computer hacking
Acunetix
biblio
Detection of SQL injection attacks by removing the parameter values of SQL query
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
privacy
web services
web applications
tools
Structured Query Language
SQL query
SQL Injection attacks
SQL injection attackers
SQL injection attack detection method
SQL injection
SQL
Runtime
Resiliency
query processing
pubcrawl
backend database
policy-based-governance
parameter values
mobile web applications
mobile computing
Metrics
Internet users
internet
Human behavior
desktop web application
Databases
database
confidential information
Conferences
Computer crime
biblio
Real-time ETL in Striim
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
Resiliency
Human behavior
pubcrawl
privacy
Metrics
SQL injection
data validation
ETL
real-time
policy-based-governance
biblio
Efficient Astronomical Query Processing Using Spark
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
Resiliency
Human behavior
pubcrawl
privacy
Metrics
SQL injection
astronomical survey data management
Big Data
query processing
spark framework
policy-based-governance
biblio
WOVSQLI: Detection of SQL Injection Behaviors Using Word Vector and LSTM
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
threat vectors
Human behavior
LSTM networks
Metrics
policy-based-governance
privacy
pubcrawl
Resiliency
SQL injection
SQL injection detection
SQL token word vector
biblio
SQL Injection Attack Principles and Preventive Techniques for PHP Site
Submitted by aekwall on Mon, 02/25/2019 - 10:38am
Resiliency
Human behavior
pubcrawl
privacy
Metrics
injection detection
PHP injection
PHP injection prevention
PHP site
SQL injection
SQL injection prevention
policy-based-governance