Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cross-site scripting
biblio
Cookies in a Cross-site scripting: Type, Utilization, Detection, Protection and Remediation
Submitted by grigby1 on Wed, 02/10/2021 - 1:20pm
Browsers
Cross Site Scripting
XSS
spyware
protection
mitigation
cookies
Cisco 2018
artificial intelligence techniques
cross-site scripting
classification
web applications
Cryptography
Artificial Intelligence
security vulnerabilities
Data protection
internet
Scalability
Resiliency
resilience
Human behavior
pubcrawl
security of data
encryption
biblio
A Practical Exercise System Using Virtual Machines for Learning Cross-Site Scripting Countermeasures
Submitted by grigby1 on Wed, 02/10/2021 - 1:19pm
Resiliency
XSS countermeasures
XSS attacks
Web servers
Web server
Web pages
Web Browser Security
Web browser
web applications
Virtual machining
virtual machines
tools
Software
security of data
Scalability
virtual machine security
resilience
public domain software
pubcrawl
practical exercise system
online front-ends
learning cross-site scripting
internet
Human behavior
cross-site scripting
Cross Site Scripting
computer science education
Browsers
security
virtual machine
biblio
XSS Attack Detection With Machine Learning and n-Gram Methods
Submitted by aekwall on Mon, 12/14/2020 - 12:29pm
Training data
nearest neighbour methods
Predictive Metrics
pubcrawl
Resiliency
security of data
support vector machine
Support vector machines
SVM
Naive Bayes
Uniform resource locators
vulnerable
Web sites
website
XSS attack
XSS attack detection
XSS attacks
KNN
Bayes methods
composability
cookies
Cross Site Scripting
cross-site scripting
detection script
feature extraction
k-nearest neighbour
Attack vectors
learning (artificial intelligence)
machine learning
machine learning algorithms
malicious script
malicious scripts
N-gram
n-gram method
biblio
Automatic XSS Detection and Automatic Anti-Anti-Virus Payload Generation
Submitted by aekwall on Mon, 09/28/2020 - 12:35pm
parameter characteristics
SVM algorithm
XSS vulnerability
automatic anti-anti-virus payload generation tool
automatic bypassing
automatic detection
automatic XSS detection tool
DQN algorithm
malicious XSS attacks
malicious XSS parameters
Web application
RNN LSTM algorithm
rule-based WAF
user input parameters
user interaction
Web 2.0 era
XSS attack
XSS attack codes
Cross Site Scripting
internet
Support vector machines
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Human behavior
pubcrawl
Reinforcement learning
Scalability
tools
cross-site scripting
Training
recurrent neural nets
automatic generation
computer viruses
Payloads
Browsers
biblio
Adaptive Random Testing for XSS Vulnerability
Submitted by aekwall on Mon, 09/28/2020 - 12:34pm
Browsers
Cross Site Scripting
XSS testing tool
Subspace constraints
open source vulnerable benchmarks
headless browser
fuzzing method
common vulnerabilities
black-box testing tools
ART method
adaptive random testing
XSS vulnerability
fuzzing
security of data
Payloads
web applications
public domain software
program testing
cross-site scripting
Web sites
tools
internet
pubcrawl
Human behavior
Resiliency
Scalability
biblio
Beware of the Vulnerability! How Vulnerable are GitHub's Most Popular PHP Applications?
Submitted by aekwall on Mon, 09/28/2020 - 12:34pm
PHP
CVSS
critical vulnerabilities
GitHub
injection vulnerabilities
open source
open source PHP applications
open source project owners
open source projects
software vulnerabilities
project popularity
RIPS
scanning
software project
Software Vulnerability
static analysis vulnerability scanner
vulnerable project
Cross Site Scripting
Computer bugs
data integrity
security
Resiliency
Human behavior
pubcrawl
tools
software engineering
static analysis
Scalability
statistical analysis
software security
vulnerability detection
Computers
cross-site scripting
XSS
Open Source Software
biblio
Practical Combinatorial Testing for XSS Detection using Locally Optimized Attack Models
Submitted by aekwall on Mon, 09/28/2020 - 12:34pm
test case generation
black-box security testing
combinatorial testing
combinatorial testing methodology
locally optimized attack models
modelling approach
modelling scheme
security testing
security testing tool
Black box testing
test oracle
Verification Framework
web applications
XSS attack vectors
XSS detection
XSSInjector
Cross Site Scripting
security of data
cross-site scripting vulnerabilities
JavaScript
XSS
formal verification
application security
Web application
program testing
Grammar
cross-site scripting
tools
internet
pubcrawl
Human behavior
Resiliency
Scalability
biblio
A Survey on Vulnerability Assessment Penetration Testing for Secure Communication
Submitted by aekwall on Mon, 09/28/2020 - 12:33pm
software security
Cross Site Scripting
Vulnerability Assessment and Penetration Testing (VAPT)
security patches
Security Misconfiguration
security loopholes
security hacking activities
Internet application
cyber threat
Cross-site scripting (XSS)
broken authentication
communication security
Web Application Security
vulnerability assessment
Scalability
program testing
Penetration Testing
cross-site scripting
tools
internet
Databases
Computer crime
SQL injection
pubcrawl
Human behavior
Resiliency
Organizations
biblio
Mitigation of Cryptojacking Attacks Using Taint Analysis
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Resiliency
malware
man-in-the-middle
man-in-the-middle attack
Metrics
mitigation
online front-ends
pubcrawl
resilience
malicious cryptocurrency mining
script characteristics
security of data
taint analysis
taint analysis method
threat model
Web site background
Web sites
abuse case
in-browsercryptojacking mitigation
Human Factors
Human behavior
Google Chrome
Data mining
cryptomining
cryptojacking
Cryptography
cryptocurrency
cross-site scripting
CPU usage
CPU resources
Central Processing Unit
Browsers
Attack Modeling
biblio
Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack
Submitted by grigby1 on Mon, 02/10/2020 - 11:24am
privacy
website
SQL injection
SQL detection
Sniffing
Scalability
Resiliency
resilience
pubcrawl
Brute Force Attack
policy-based governance
Penetration Testing
Metrics
man-in-the-middle attack
Human behavior
cross-site scripting
Cross Site Scripting
collaboration
« first
‹ previous
1
2
3
4
5
6
next ›
last »