Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
XML
biblio
Client-Side Verification Framework for Offline Architecture of IoT
Submitted by aekwall on Mon, 02/10/2020 - 11:07am
sensors
Smart Grid Sensors
smart grid system
smart garbage collection
offline architecture
client-side verification framework
IoT systems
XML
Compositionality
smart cities
indexing
storage management
Network
Human Factors
IoT
Smart homes
Urban areas
energy consumption
Web servers
Smart Grids
pubcrawl
Resiliency
mobile computing
security
Hardware
Internet of Things
Conferences
computer network security
biblio
Cross-Site Scripting for Graphic Data: Vulnerabilities and Prevention
Submitted by aekwall on Mon, 12/16/2019 - 1:17pm
Scalability
XSS vulnerabilities
XSS attacks
XSS
XML treatment method
XML
white list.
websites
Web sites
Vulnerability
testing
TES
SVG image
SVG
security of data
Cross Site Scripting
resilience
pubcrawl
malware
Human behavior
graphical content
graphic content
cross-site scripting
Computer graphics
code
Cascading style sheets
black list
attack
animation
Resiliency
biblio
MeetCI: A Computational Intelligence Software Design Automation Framework
Submitted by grigby1 on Mon, 12/09/2019 - 1:01pm
MeetCI
XML file
XML
tools
specific supported functionality
software implementation process
software engineering
Software design automation
Software algorithms
Software
Security Evaluation
Recurrent neural networks
recurrent neural nets
public domain software
pubcrawl
open source software framework
application design decisions
machine learning domains
machine learning
Libraries
learning (artificial intelligence)
language compatibility
expert systems
expert system
Cryptography
computational intelligence techniques
computational intelligence software design automation framework
computational intelligence libraries
computational intelligence
Compositionality
composability
CI users
biblio
Secure Coding Practices in Java: Challenges and Vulnerabilities
Submitted by grigby1 on Wed, 10/30/2019 - 9:53am
Security by Default
multiple security vulnerabilities
programming
programming challenges
programming obstacles
pubcrawl
resilience
Resiliency
Scalability
Secure Coding
secure coding assistance
secure coding practices
Libraries
Spring security
SSL-TLS security
SSL/TLS
StackOverflow
StackOverflow forum
StackOverflow posts
third-party framework
third-party libraries
XML
XML-based approaches
cryptographic hash functions
security
application program interfaces
authentication
authorisation
authorization
authorization features
Certificate Validation
complex Java-based
complicated cross-language data handling
Computer crime
cross-site request forgery attacks
coding theory
Cryptography
cryptography API
CSRF
developers time
empirical study
encoding
insecure coding practices
Java
Java platform
Java secure coding
biblio
Research on Storage Mechanism of Cloud Security Policy
Submitted by aekwall on Tue, 10/22/2019 - 8:53am
cloud security policy
Security Policies Analysis
XML
storage mechanism
security policy
Secure storage
popular policy repositories
policy storage technology
policy repository
policy information
Key Words: Cloud Computing
Formal concept analysis
security of data
cloud computing security
storage management
Cloud Security
relational databases
Lattices
testing
policy-based governance
pubcrawl
cloud storage
Cloud Computing
biblio
Hybrid Encryption for Securing SharedPreferences of Android Applications
Submitted by grigby1 on Thu, 01/31/2019 - 11:16am
internal memory
XML
source code (software)
source code
smart phones
SharedPreferences
Shared Preference interface
Scalability
Resiliency
resilience
pubcrawl
password
Mobile Applications
Metrics
Keystore
android
hybrid encryption approach
Humanoid robots
Human Factors
Human behavior
encryption algorithm
encryption
Cryptography
confidential information
Androids
Android operating system
Android Keystore system
android encryption
Android applications
Android (operating system)
biblio
A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns
Submitted by grigby1 on Mon, 01/21/2019 - 11:37am
network-based intrusion systems
execution sequences
fileless malware
host based intrusion detection system
installed applications
lightweight host-based intrusion detection system
malicious activities
malicious e-mail attachments
management tools
network administrators
enterprise networks
OS vendors
PowerShell process
process generation patterns
process information
serious social problem
Spreadsheet programs
system constructs process trees
targeting organizations
XML
microsoft windows
tools
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
drive-by-download attacks
Intrusion Detection
security of data
Organizations
advanced persistent threat
advanced persistent threats
active processes
anomaly processes
anti-virus software
computer viruses
Electronic mail
biblio
An Incremental Learner for Language-Based Anomaly Detection in XML
Submitted by grigby1 on Fri, 07/06/2018 - 1:05pm
Simple object access protocol
poisoning attack
protocol specifications
Protocols
pubcrawl
pushdown automata
resilience
Resiliency
Scalability
security
Semantics
signature wrapping attack
mixed-content XML
stream validation
visibly pushdown automata
Web Service
web services
Wrapping
XML
XML schema validation
XML types
XML-based protocols
zero false positives
explicit security problems
AI Poisoning
Anomaly Detection
anomaly detector
Apache Axis2
Apache Rampart
automata theory
automaton states
complex language
datatyped XML
dXVPA
Experimental Evaluation
adversarial training data
extensible markup language
grammatical inference
Human behavior
incremental learner
language representation
language-based anomaly detection
learned automaton
learning (artificial intelligence)
learning automata
message formats
biblio
Towards an Attack Signature Generation Framework for Intrusion Detection Systems
Submitted by grigby1 on Wed, 05/30/2018 - 3:05pm
security of data
XPath injection
XML
web services
Web Service
web security testing tools
Weapons
tools
SOAP injeciton
Simple object access protocol
signature IDSs
Signaturebased Intrusion Detection Systems
signature based defense
Servers
attacks
Scalability
Resiliency
resilience
pubcrawl
privilege escalation
organizations valuable information resources
Information Leakage
genetic algorithms
deployed web services
attack signatures
attack signature generation framework
attack signature generation approach
biblio
DepSys: Dependency aware integration of cyber-physical systems for smart homes
Submitted by el_wehby on Fri, 05/25/2018 - 2:50pm
DepSys
XML
water supply
utility sensing infrastructure
system interdependency problems
smart phones
Smart homes
physical world entities
home computing
Energy resolution
Electricity supply industry
actuation infrastructure
dependency aware system integration
dependency
cyber-physical systems
CPS applications
control
Containers
Conflict Resolution
conflict detection
Availability
actuators
1536086
« first
‹ previous
1
2
3
next ›
last »