Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy
biblio
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation
Submitted by rvmeush on Fri, 09/26/2014 - 1:04pm
audio
Automatic testing
captchas
Demography
Friction
Humans
image
Large-scale systems
mechanical turk
Mechanical variables measurement
privacy
security
Speech
Statistics
biblio
State of the Art: Automated Black-Box Web Application Vulnerability Testing
Submitted by rvmeush on Fri, 09/26/2014 - 1:04pm
Automatic testing
Code standards
Computer hacking
Credit cards
Cross Site Scripting
Data Security
Decision support systems
Forgery
Personnel
privacy
Probes
SQL injection
SQLI
XSS
biblio
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
Submitted by rvmeush on Fri, 09/26/2014 - 1:04pm
Computerized monitoring
dynamic analysis
Filters
Heuristic algorithms
Information analysis
information security
Performance analysis
privacy
Reactive power
Runtime
Symbolic Execution
taint analysis
testing
biblio
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Submitted by rvmeush on Fri, 09/26/2014 - 1:04pm
Anomaly Detection
computer science
computer security
Computerized monitoring
Guidelines
Intrusion Detection
Laboratories
machine learning
National security
network security
privacy
telecommunication traffic
biblio
Formalizing Anonymous Blacklisting Systems
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
mail servers
trust assumptions
service providers
service provider
Resistance
Relays
real-world adoption
Protocols
privacy-enhanced revocation
privacy properties
privacy enhancing technologies
privacy
abusive anonymous users
IRC networks
internet
formalizing anonymous blacklisting systems
computer network security
authentication
anonymous revocation systems
anonymous communications networks
anonymous blacklisting systems
anonymous blacklisting
anonymity
biblio
Third-Party Web Tracking: Policy and Technology
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
security
Web sites
Web privacy
Web pages
Web innovation
user browsing activity tracking
third-party Web tracking
third-party Web sites
third-party tracking
social networking
advertising
privacy
History
fourth party Web measurement platform
Economics
Do Not Track
data privacy
Companies
analytics
biblio
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
privacy
Web sites
Web site identification
Web pages
Vectors
upstream bandwidth
traffic morphing scheme
traffic analysis countermeasures
traffic analysis attack
TLS
telecommunication traffic
TA attack
Support vector machines
SSH
security
Accuracy
padding
machine learning
IPsec
hypermedia
HTTP traffic
general-purpose TA countermeasures
encryption
encrypted tunnel
encrypted traffic
downstream bandwidth
Cryptography
Bandwidth
attack/countermeasure pairings
biblio
The Psychology of Security for the Home Computer User
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
Phishing
usability and security
Software
security interventions
security decisions
security breaches
security
risky behavior
privacy
Computational modeling
home users
home computer user
Electronic mail
Educational institutions
Computers
computer security
Computer crime
biblio
Evidence-based Trust Reasoning
Submitted by jingweihuang on Wed, 09/17/2014 - 6:31pm
Modeling
Science of Security
Foundations
ACM CCS
Evidence-based trust
foundations
modeling
Operating systems security
privacy
Science of Security
Systems Security
Trust Frameworks
trust model
Trusted Computing
Trusted platforms
ACM CCS
Trusted Computing
Trusted platforms
Trust Frameworks
Operating Systems Security
Systems Security
event
ITT Trust and Security Seminar (TSS) - Michael Twidale: "The Usability of Security"
Sep 09, 2014 4:00 pm - 5:00 pm CDT
Submitted by Anonymous on Wed, 08/27/2014 - 12:17pm
ABSTRACT
Science of Security
Foundations
passwords
sociotechnical systems engineering
privacy
usability
Abstract
Seminar
« first
‹ previous
…
241
242
243
244
245
246
247
248
249
next ›
last »