Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Whitelists
biblio
Information Security Architecture Design of CBTC System
Submitted by grigby1 on Tue, 03/01/2022 - 3:36pm
CBTC
computer architecture
Firewalls (computing)
information security
network architecture
network security
Network Security Architecture
pubcrawl
resilience
Resiliency
security domains
special use firewall
Whitelists
Wireless communication
biblio
Using MajorClust Algorithm for Sandbox-Based ATM Security
Submitted by grigby1 on Tue, 12/21/2021 - 11:38am
Online banking
Zero day attacks
Whitelists
whitelisting
tools
software security
Software algorithms
sandboxing
Resiliency
resilience
pubcrawl
ATM
Metrics
Intrusion Protection
Filtering
evolutionary computing
evolutionary computation
defense
cyber security
composability
clustering
Big Data
biblio
RSDS: Getting System Call Whitelist for Container Through Dynamic and Static Analysis
Submitted by grigby1 on Tue, 07/27/2021 - 11:32am
Security by Default
system call
seccomp
Whitelists
Docker
resilience
Kernel
Containers
Linux
static analysis
Scalability
Resiliency
pubcrawl
security
Cloud Computing
biblio
SQL Injection Attack and Detection Based on GreenSQL Pattern Input Whitelist
Submitted by grigby1 on Mon, 03/15/2021 - 12:08pm
Resiliency
internet technology
IP networks
Metrics
optimized whitelist
Pattern
patterned input
pubcrawl
resilience
internet
SQL
SQL injection
SQL injection attack
SQL injection attack command
Whitelist
Whitelists
working mode
Big Data
intercept samples
input model
Information systems
GreenSQL pattern input whitelist
GreenSQL learning
GreenSQL database firewall
GreenSQL
Firewalls (computing)
firewalls
Databases
database protection
database management systems
dangerous threat
composability
command injection attacks
biblio
A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks
Submitted by grigby1 on Wed, 02/26/2020 - 3:35pm
Scalability
nonce identity value
privacy
pubcrawl
Resiliency
Routing
routing path
Routing protocols
RPL
RPL IoT routing algorithm
RSSI
node trust value
security
sensor networks
Sybil based identity attacks
telecommunication network routing
telecommunication security
Trust Routing
Whitelists
wireless sensor networks
Wireshark
COTS IoT devices
ARSSI
average received signal strength indicator
commercial off the shelf standards
common security techniques
composability
computer architecture
Conferences
control overhead
Cooja network simulator
architecture
denial of service attack
Internet of Things
lightweight trust-based security architecture
military communities
mobile IoT network
mobile IoT wireless network
mobile radio
Network Security Architecture
network whitelist
biblio
Automatic Whitelist Generation for SQL Queries Using Web Application Tests
Submitted by grigby1 on Mon, 02/10/2020 - 10:26am
severe vulnerability issue
query patterns
query processing
Registers
relational databases
relational database security
research and development
resilience
Resiliency
security of data
query detection
SQL
SQL detection
SQL injection
SQL queries
Web application test
Web application tests
Whitelist
Whitelists
development process
automated generation
Automatic testing
automatic whitelist generation
blacklisting
collaboration
composability
confidential information
Database Security
Databases
application-specific implementations
Human behavior
internet
large-scale Web applications
legitimate queries
Metrics
policy-based governance
privacy
pubcrawl