Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security of data
biblio
Hardening Firefox against Injection Attacks
Submitted by grigby1 on Wed, 02/10/2021 - 1:22pm
real-world security vulnerabilities
user interfaces
Web pages
Browser Security
information retrieval
CSS
Firefox
Hardening
injection attacks
HTML
Universal Cross-site Scripting
untrusted Web content
user interface
Web browsers display content
web security
Web security model
Cross Site Scripting
online front-ends
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
internet
Runtime
security of data
JavaScript
World Wide Web
authoring languages
Browsers
operating systems
Web sites
hypermedia markup languages
biblio
XSS Detection Technology Based on LSTM-Attention
Submitted by grigby1 on Wed, 02/10/2021 - 1:21pm
LSTM-attention detection model
XSS attacks
abstract features
added attention mechanism
attention mechanism
context-related features
Cross-site scripting (XSS)
inadequate feature extraction
long short-term memory recurrent neural network
cross-site scripting
malicious attack codes
traditional XSS detection methods
Word2Vec
XSS codes
XSS detection model
XSS detection technology
XSS payload features
Cross Site Scripting
Scalability
learning (artificial intelligence)
security of data
feature extraction
pubcrawl
Human behavior
resilience
Resiliency
robots
deep learning
Data models
internet
recurrent neural nets
pattern classification
Recurrent neural networks
Context modeling
LSTM
biblio
An Analytical Study on Cross-Site Scripting
Submitted by grigby1 on Wed, 02/10/2021 - 1:20pm
browser side script
Cross Site Scripting
XSS vulnerabilities
XSS attack
Web application
symantic states
Persistent XSS attack
Non-persistent XSS attack
input validation
injection
fake malicious website
security of data
cross-site scripting
malicious scripts
phishing attack
Web sites
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Cookies in a Cross-site scripting: Type, Utilization, Detection, Protection and Remediation
Submitted by grigby1 on Wed, 02/10/2021 - 1:20pm
Browsers
Cross Site Scripting
XSS
spyware
protection
mitigation
cookies
Cisco 2018
artificial intelligence techniques
cross-site scripting
classification
web applications
Cryptography
Artificial Intelligence
security vulnerabilities
Data protection
internet
Scalability
Resiliency
resilience
Human behavior
pubcrawl
security of data
encryption
biblio
A Practical Exercise System Using Virtual Machines for Learning Cross-Site Scripting Countermeasures
Submitted by grigby1 on Wed, 02/10/2021 - 1:19pm
Resiliency
XSS countermeasures
XSS attacks
Web servers
Web server
Web pages
Web Browser Security
Web browser
web applications
Virtual machining
virtual machines
tools
Software
security of data
Scalability
virtual machine security
resilience
public domain software
pubcrawl
practical exercise system
online front-ends
learning cross-site scripting
internet
Human behavior
cross-site scripting
Cross Site Scripting
computer science education
Browsers
security
virtual machine
biblio
On Countermeasures Against the Thermal Covert Channel Attacks Targeting Many-core Systems
Submitted by grigby1 on Wed, 02/10/2021 - 12:52pm
Bit error rate
three-step countermeasure
thermal covert channel attacks
Thermal Covert Channel
TCC attack
signal frequency scanning
manycore systems
Many-core systems
dynamic voltage frequency scaling technique
DVFS technique
Defense against Covert Channel Attack
critical defense issue
Multicore processing
signal detection
security of data
covert channels
error statistics
Temperature sensors
Transmitters
Compositionality
Receivers
multiprocessing systems
thermal noise
Scalability
Resiliency
resilience
pubcrawl
biblio
A Network Covert Timing Channel Detection Method Based on Chaos Theory and Threshold Secret Sharing
Submitted by grigby1 on Wed, 02/10/2021 - 12:50pm
resilience
unique channel traits
traditional security policies
time series
Threshold secret sharing
telecommunication traffic
telecommunication channels
stable channel traits
security of data
security concern
secret reconstruction strategy
Scalability
Robustness
Resiliency
channel identifier
pubcrawl
one-dimensional time series
network traffic
network covert timing channel detection method
network covert timing channel
NCTC detection method
inter-packet delay
high-dimensional phase space
covert channels
Compositionality
chaos theory
chaos
biblio
Immutable DNA Sequence Data Transmission for Next Generation Bioinformatics Using Blockchain Technology
Submitted by aekwall on Mon, 02/08/2021 - 1:52pm
genomics
secure data
DNA cryptography
biology computing
Genetics
block-chaining technology
decentralized
future generation bioinformatics systems
genome-sequencing
healthcare providers
healthcare user
high throughput DNA sequencing technology
Immutable
immutable DNA sequence data transmission
secure storage platform
secured substances
securing healthcare data
privacy
security of data
Cryptography
Resiliency
Human behavior
pubcrawl
blockchain
open source
data analysis
security
DNA
blockchain technology
Healthcare
health care
medical information systems
Predictive Metrics
bioinformatics
biblio
Naval cyber-physical anomaly propagation analysis based on a quality assessed graph
Submitted by aekwall on Mon, 02/08/2021 - 1:39pm
naval CPS
Anomalies
CPS anomalies
cyber-physical system
data and information quality
data streams
data-driven decision system
digital subsystems
information quality measures vectors
Marine vehicles
naval cyber-physical anomaly propagation analysis
naval engineering computing
naval propulsion management system
optimized supervisory control
programmable logical controller
propagation analysis
quality assessed graph
system graph
Analytical models
Scalability
Data models
cyber-physical systems
Resiliency
pubcrawl
graph theory
Computational modeling
Metrics
security of data
cyber-attacks
Anomaly Detection
sensors
Human Factors
Compositionality
programmable controllers
navigation
Cyber Dependencies
biblio
A Framework for Risk Assessment in Augmented Reality-Equipped Socio-Technical Systems
Submitted by grigby1 on Wed, 02/03/2021 - 1:10pm
privacy
visualization
technical entities
taxonomy
sociotechnical systems
socio-technical systems
socio-economic effects
security of data
safety modeling
Safety
risk management
risk assessment
risk analysis
resilience
pubcrawl
Analytical models
immersive visual technology
immersive systems
Human Factors
human capabilities
Human behavior
extended human function
dependability threat
cyber physical systems
composability
augmented reality-equipped socio-technical systems
augmented reality
AR-relevant dependability threats
AR-extended human failures
AR-equipped socio-technical systems
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »