Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Web Application Security
biblio
Half-Baked Cookies: Hardening Cookie-Based Authentication for the Modern Web
Submitted by grigby1 on Mon, 09/11/2017 - 2:17pm
browser cookies
Browser Security
Human behavior
pubcrawl
Resiliency
Scalability
Web Application Security
biblio
Ensuring Endpoint Authenticity in WebRTC Peer-to-peer Communication
Submitted by grigby1 on Tue, 05/30/2017 - 12:55pm
collaboration
composability
Human behavior
Metrics
peer authentication
peer to peer security
peer-to-peer communication
pubcrawl
real-time communication
Resiliency
Scalability
Web Application Security
WebRTC
biblio
Automated white-list learning technique for detection of malicious attack on web application
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Logic gates
XSS attack
XML
Web Application Security
WAMG(Web Application Model Generator)
Structured Query Language
Standards organizations
SQL injection attack
semistructured XML case generation
security of data
security
Resiliency
pubcrawl
Organizations
malicious attack detection
maintenance engineering
automated white-list learning technique
learning (artificial intelligence)
internet
Human behavior
HTTP response splitting attack
HTTP request splitting attack
Generators
extensible markup language
Default Deny model(White Listing)
Default allow model (Black Listing)
default allow model
cross site scripting attack
Cross Site Scripting
composability
Buffer overflow attack
biblio
Static analysis for web service security - Tools amp; techniques for a secure development life cycle
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
Web Application Security
SOA
SOAP
software bugs
Software verification
Source code analysis
Static Analysis Tool
static code analysis
strategic components
ubiquitous IoT
vulnerabilities detection
vulnerability identification
Simple object access protocol
web applications
Web service security
web services
Web services guidelines
Web Services Security
WS-SecureConversation
WS-security
XML
XML encryption
XML signature
program verification
critical national infrastructure
Cryptography
dynamic analysis
enterprise software ecosystem
Heartbleed
information exchange
mission critical API
Mobile Applications
Open Web Application Security Project
Penetration Testing
program diagnostics
Computer crime
public deployments
public sector infrastrucure development life cycle
Secure Software Development
security challenges
Security Code Review
service development paradigm
service oriented architecture
service-oriented architecture
services security
Shellshock
biblio
Towards Improving Web Attack Detection: Highlighting the Significant Factors
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
internet
XSS
Web attack detection
Web application vulnerabilities
Web Application Security
Web application protection
Uniform resource locators
session management
pubcrawl170109
Monitoring
IP networks
Intrusion Detection
broken authentication
injection
information management
information access
hackers
e-business
denial of service attack
Data protection
cyber attack
cross-site scripting
Computer crime
Buffer overflows
biblio
XSSDM: Towards detection and mitigation of cross-site scripting vulnerabilities in web applications
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
Reactive power
XSSDM
Web Application Security
Web application
static taint analysis
static analysis
standards
source code (software)
source code
Servers
Sensitivity
security vulnerability
security
Computer crime
pubcrawl170109
program diagnostics
pattern matching technique
pattern matching
internet
HTML
cyber crime
cross-site scripting vulnerability detection
Cross-site scripting (XSS)
context-sensitive approach
Context Sensitive
Context
biblio
Trustworthy Context-dependent Services
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:31pm
Resilient Systems
Science of Security
Foundations
ACM CCS
Domain-Specific Security and Privacy Architectures
foundations
Resilient Systems
Science of Security
Software and Application Security
Web Application Security
ACM CCS
Domain-Specific Security and Privacy Architectures
Web Application Security
Software and Application Security
biblio
Type-specific Languages to Fight Injection Attacks
Submitted by JonathanAldrich on Wed, 09/17/2014 - 6:31pm
Secure Control Systems
Science of Security
Foundations
ACM CCS
foundations
Science of Security
secure control systems
Software and Application Security
Web Application Security
ACM CCS
Web Application Security
Software and Application Security
biblio
An Analysis Method for Medical Device Security
Submitted by arnabray on Wed, 09/17/2014 - 6:31pm
CPS Domains
Medical Devices
Health Care
Science of Security
Foundations
ACM CCS
CPS Domains
cyber security
foundations
health care
medical device security
medical devices
Science of Security
Software and Application Security
Web Application Security
ACM CCS
Cyber Security
Web Application Security
Software and Application Security
« first
‹ previous
1
2