Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Penetration Testing
biblio
Testing IoT Security: The Case Study of an IP Camera
Submitted by grigby1 on Wed, 08/11/2021 - 4:04pm
collaboration
composability
Internet of Things
IP Camera
ip privacy
Penetration Testing
policy-based governance
pubcrawl
resilience
Resiliency
security
Vulnerability
biblio
Smart Security Audit: Reinforcement Learning with a Deep Neural Network Approximator
Submitted by aekwall on Tue, 04/27/2021 - 1:29pm
Scalability
Task Analysis
Adaptation models
Resiliency
Human behavior
pubcrawl
audit
Reinforcement learning
tools
Penetration Testing
Biological neural networks
Deep Neural Network
Security Audits
pentesting
q-learning
biblio
Improvement of information System Audit to Deal With Network Information Security
Submitted by aekwall on Tue, 04/27/2021 - 1:27pm
Inspection
Scalability
Resiliency
Human behavior
pubcrawl
Penetration Testing
Business
Data mining
Information systems
Uniform resource locators
Security Audits
Zirconium
Information System Audit
network information security
biblio
Gathering Insights from Teenagers’ Hacking Experience with Authentic Cybersecurity Tools
Submitted by grigby1 on Wed, 11/04/2020 - 2:01pm
Games
tools
serious games (computing)
science-popularizing program
realistic virtual network infrastructure
pubcrawl
program testing
professional game
privacy
Penetration Testing
Hacking
active learning
further education
education
cybersecurity tools
cybersecurity game
cybersecurity education
cyber physical systems
Conferences
Computer crime
computer aided instruction
authentic cybersecurity
biblio
A Survey on Vulnerability Assessment Penetration Testing for Secure Communication
Submitted by aekwall on Mon, 09/28/2020 - 12:33pm
software security
Cross Site Scripting
Vulnerability Assessment and Penetration Testing (VAPT)
security patches
Security Misconfiguration
security loopholes
security hacking activities
Internet application
cyber threat
Cross-site scripting (XSS)
broken authentication
communication security
Web Application Security
vulnerability assessment
Scalability
program testing
Penetration Testing
cross-site scripting
tools
internet
Databases
Computer crime
SQL injection
pubcrawl
Human behavior
Resiliency
Organizations
biblio
High-risk Problem of Penetration Testing of Power Grid Rainstorm Disaster Artificial Intelligence Prediction System and Its Countermeasures
Submitted by aekwall on Mon, 06/01/2020 - 10:54am
resilience
power engineering computing
power grid rainstorm disaster artificial intelligence prediction system
power grid storm disasters
power grids
power Internet of Things
power meteorological service technology support
power system security
power transformer testing
program debugging
pubcrawl
policy-based governance
Resiliency
security of data
SQL
SQL blind bug
SQL injection
SQL injection attack behavior
SQL injection penetration test
Storms
system penetration testing
Vulnerability
host security
Artificial Intelligence
artificial storm prediction system
Companies
composability
disaster prediction information systems
disasters
electric power information system security defense work
electrical safety
energy Internet disaster safety
energy internet disaster security
application security
information security
Information systems
internet
Internet of Things
middleware
middleware security
network security
password
Penetration Testing
PGRDAIPS
biblio
Security Testing Of Active Optical Network Devices
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
passive exploration
tools
testing devices
testing
tested polygon
security testing
security
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Penetration Testing
Passive optical networks
active exploration
Optical network units
optical fibre networks
optical
Network reconnaissance
Network
Linux
Kali Linux
huawei
gpon
conducted testing
computer network security
analysis
active optical network devices
biblio
Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack
Submitted by grigby1 on Mon, 02/10/2020 - 11:24am
privacy
website
SQL injection
SQL detection
Sniffing
Scalability
Resiliency
resilience
pubcrawl
Brute Force Attack
policy-based governance
Penetration Testing
Metrics
man-in-the-middle attack
Human behavior
cross-site scripting
Cross Site Scripting
collaboration
biblio
Security Assessment of Libyan Government Websites
Submitted by grigby1 on Wed, 10/23/2019 - 12:39pm
security issues
Reconnaissance
resilience
Resiliency
Safety
Scalability
secure programming practices
security assessment
security assessment results
pubcrawl
security level
security of data
security policies
SSL Trust Models
vulnerability assessment
Web sites
Website Vulnerability
internet
Cryptography
data privacy
E-Government
encryption
Government
government data processing
Human behavior
In formation Security
Computer crime
Libya E-government
Libyan government websites
Metrics
Penetration Testing
privacy
privacy polic
Privacy Policy
biblio
Wireless Security Audit Penetration Test Using Raspberry Pi
Submitted by grigby1 on Mon, 07/01/2019 - 10:03am
Scalability
wireless technology
wireless security audit
Wireless Protected Access
wireless networks
wireless LAN
Wireless fidelity
Wired Equivalent Privacy
WiFi testing tools
WiFi network
WiFi Auditor
WiFi attacks
tools
telecommunication security
Security Audits
auditing
Resiliency
resilience
Raspberry Pi 3 module
pubcrawl
Penetration Testing
penetration tester
man in the middle
Jamming
Human Factors
Human behavior
deliberate jamming
Communication system security
authorized wireless communications
authorisation
« first
‹ previous
1
2
3
4
next ›
last »