Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
web services
biblio
Evaluation of SQL Injection Prevention Methods
Submitted by grigby1 on Mon, 02/10/2020 - 11:25am
security of data
websites
web services
web applications
SQL Injection Prevention Methods
SQL injection prevention
SQL injection issue
SQL injection
SQL detection
SQL
collaboration
Resiliency
resilience
pubcrawl
privacy
policy-based governance
Metrics
internet
Human behavior
evaluation
biblio
Privacy Preservation and Mandate Representation in Identity Management Systems
Submitted by grigby1 on Tue, 01/21/2020 - 11:36am
resilience
OpenID Connect framework
privacy
privacy enhanced solutions
privacy issues
privacy requirements yardstick
private data
protecting users identity
pubcrawl
redundant users data
requestors
mobile phone
Scalability
service provider
service providers
services identity management systems
User-centred
user-centred mandate representation system
users autonomous powers
users digital identities
users participation
web services
digital data
access token
authenticated entities
authentication
authentication process
authenticity
authorisation
authorisation service
authorization
data owner
data privacy
access rights
electronic services
electronic space
fine-grained access
Human behavior
identity data
Identity management
identity management systems
internet
Internet usage
Mandate representation
biblio
Central Audit Logging Mechanism in Personal Data Web Services
Submitted by grigby1 on Mon, 07/01/2019 - 10:03am
personal data Web services
web services
Web service platform
Web Service
Simple object access protocol
Servers
security of data
Security Audits
Scalability
Routing
Resiliency
resilience
pubcrawl
personal information
access logs
personal data
Law
internet
Human Factors
Human behavior
Databases
data source
central audit logging mechanism
auditing
Audit Logging
application program interfaces
API Policy
API
biblio
Low-Cost Breaking of a Unique Chinese Language CAPTCHA Using Curriculum Learning and Clustering
Submitted by aekwall on Mon, 04/01/2019 - 10:08am
security
learning (artificial intelligence)
low-cost breaking
machine learning methods
microsoft windows
natural language processing
OCR software
optical character recognition
pattern clustering
potential training methods
pubcrawl
Kernel
Task Analysis
text analysis
text distortion
text-based CAPTCHAs focus
Training
transcription tasks
unique Chinese language CAPTCHA
web services
Web sites
curriculum clustering
CAPTCHA
captchas
Chinese language question-and-answer Website
CNN
composability
convolution
convolutional neural network
convolutional neural networks
correct response
automated access
curriculum learning
feature map
feedforward neural nets
Human behavior
human user
image distortion
inverted character
inverted characters
inverted symbols
biblio
A Cross Correlation Approach for Breaking of Text CAPTCHA
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
challenge-response test
text CAPTCHA
Segmentation
Optical character recognition software
online web service providers
OCR
Noise measurement
image denoising
image classification
distorted text
cross correlation approach
character recognition
security of data
captcha images
CAPTCHA
image segmentation
captchas
Correlation
web services
standards
composability
pubcrawl
Human behavior
biblio
Detection of SQL injection attacks by removing the parameter values of SQL query
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
privacy
web services
web applications
tools
Structured Query Language
SQL query
SQL Injection attacks
SQL injection attackers
SQL injection attack detection method
SQL injection
SQL
Runtime
Resiliency
query processing
pubcrawl
backend database
policy-based-governance
parameter values
mobile web applications
mobile computing
Metrics
Internet users
internet
Human behavior
desktop web application
Databases
database
confidential information
Conferences
Computer crime
biblio
Email-Based Password Recovery - Risking or Rescuing Users?
Submitted by grigby1 on Thu, 02/14/2019 - 11:22am
resilience
Web sites
web services
user instructions
user authentication
usability
Unsolicited electronic mail
telecommunication security
System recovery
shared secret
security problem
secret passwords
secret link
Resiliency
authentication
pubcrawl
password recovery email
password recovery
password
message authentication
entire user-website relationship
English language websites
email-based password recovery
email content
Electronic mail
content issues
content and design of email-based password recovery
authorisation
biblio
Analytics as a service architecture for cloud-based CDN: Case of video popularity prediction
Submitted by grigby1 on Wed, 01/16/2019 - 2:37pm
CDN logs
video popularity prediction
user generated videos
scattered caches
RESTful Web services
quality of service
prediction services
NoSQL databases
NoSQL database
k-means clustering prediction model
highly variable UGV popularity
end-user content delivery network requests
end-user behaviour
dynamic model training
cloud-based CDN
Cloud Computing
analytics as a service architecture
pattern clustering
web services
Web Caching
cache storage
computer architecture
Training
Streaming media
Scalability
Resiliency
Metrics
pubcrawl
Analytical models
Predictive models
biblio
Adaptive Cache Replacement in Efficiently Querying Semantic Big Data
Submitted by grigby1 on Wed, 01/16/2019 - 2:37pm
knowledge bases querying
web services
triplestore
semantic Big Data querying
relational databases
RDF Caching
RDBMS
query response
query processing
query log
LRU
Linked Data
LFU
least recently used
least frequently used
Big Data
knowledge based systems
forecast method
exponential smoothing
Cache replacement
adaptive cache replacement policy
ACR policy
Web Caching
cache storage
Conferences
Scalability
Resiliency
Metrics
pubcrawl
biblio
An Incremental Learner for Language-Based Anomaly Detection in XML
Submitted by grigby1 on Fri, 07/06/2018 - 2:05pm
Simple object access protocol
poisoning attack
protocol specifications
Protocols
pubcrawl
pushdown automata
resilience
Resiliency
Scalability
security
Semantics
signature wrapping attack
mixed-content XML
stream validation
visibly pushdown automata
Web Service
web services
Wrapping
XML
XML schema validation
XML types
XML-based protocols
zero false positives
explicit security problems
AI Poisoning
Anomaly Detection
anomaly detector
Apache Axis2
Apache Rampart
automata theory
automaton states
complex language
datatyped XML
dXVPA
Experimental Evaluation
adversarial training data
extensible markup language
grammatical inference
Human behavior
incremental learner
language representation
language-based anomaly detection
learned automaton
learning (artificial intelligence)
learning automata
message formats
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »