Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Web sites
biblio
Preventive Techniques of Phishing Attacks in Networks
Submitted by grigby1 on Wed, 02/03/2021 - 1:02pm
malware
Web sites
spam
social engineering
security threats
Scalability
Resiliency
resilience
pubcrawl
phishing attack preventive techniques
Phishing
online businesses
online applications
network security
Anti-phishing
machine learning
internet
information technology
information security
Human Factors
Human behavior
honey pots
Honey Pot
fake Websites
fake applications
Electronic mail
e-hunting websites
Computer crime
biblio
Classification of Websites Based on the Content and Features of Sites in Onion Space
Submitted by grigby1 on Fri, 01/15/2021 - 11:23am
feedback
website classification
Tor
text analysis methods
site features
site content
parsing sites
onion-sites
onion space
onion site classification
features of onion sites
Dark Net
categories of onion sites
analysis of onion sites
Human Factors
dark web
learning (artificial intelligence)
neural network training
Python
Uniform resource locators
Electronic mail
documentation
Web sites
feature extraction
neural nets
pattern classification
internet
Human behavior
pubcrawl
Neural networks
machine learning
Training
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 11:42am
Approximation algorithms
tor resource distribution
tor anonymous communication system
suspicious malicious users
resource distribution process
resource distribution
minimum malicious user
Integer Linear Program
enumeration attacks
Distribution strategy
computer program
anonymous communication system
Bipartite graph
Linear programming
detection method
Bridges
computer network security
Communication Systems
integer programming
Relays
Web sites
sybil attacks
Metrics
resource management
graph theory
Sybil attack
detection
composability
pubcrawl
Resiliency
network security
biblio
XSS Attack Detection With Machine Learning and n-Gram Methods
Submitted by aekwall on Mon, 12/14/2020 - 11:29am
Training data
nearest neighbour methods
Predictive Metrics
pubcrawl
Resiliency
security of data
support vector machine
Support vector machines
SVM
Naive Bayes
Uniform resource locators
vulnerable
Web sites
website
XSS attack
XSS attack detection
XSS attacks
KNN
Bayes methods
composability
cookies
Cross Site Scripting
cross-site scripting
detection script
feature extraction
k-nearest neighbour
Attack vectors
learning (artificial intelligence)
machine learning
machine learning algorithms
malicious script
malicious scripts
N-gram
n-gram method
biblio
Understanding Trust, Privacy and Financial Fears in Online Payment
Submitted by aekwall on Mon, 11/23/2020 - 10:38am
online payment decision
Human behavior
human trust
customer concerns
customer fears
customer satisfaction
financial fear perception
financial fears
financial loss
privacy loss
online purchasing environment
online seller
payment page
payment security perception
perceived payment security
purchasing
risk perception
website
trust
Conferences
security
Trusted Computing
pubcrawl
privacy
Web sites
consumer behaviour
uncertainty
data privacy
Data collection
Human Factors
electronic money
online transactions
Decision Making
financial data processing
e-commerce
online payment
biblio
HTTP security headers analysis of top one million websites
Submitted by grigby1 on Fri, 11/20/2020 - 1:15pm
web security
security of data
Security Policies Analysis
server
set-cookie
strict- transport-security
tools
top one million websites survey
transport protocols
Uniform resource locators
security
web security policies
Web sites
websites
World Wide Web
www subdomain
X-content-type
X-frame-options
X-XSS-protection
X.509 Certificate
HTTP/2
Charge coupled devices
collaboration
content security policy
content-security-policy
Databases
HTTP headers
HTTP response headers analysis
HTTP security headers analysis
HTTP strict transport security
Alexa top one million list
HTTPs
HTTPS requests
hypermedia
internet
policy-based governance
Protocols
pubcrawl
redirections
referrer-policy
biblio
Preventing Poisoning Attacks On AI Based Threat Intelligence Systems
Submitted by grigby1 on Wed, 11/04/2020 - 1:13pm
poisoning attacks prevention
Web sites
Twitter
threat intelligence systems
Support vector machines
social networking (online)
security of data
security analysts
Scalability
Resiliency
resilience
pubcrawl
AI Poisoning
online social media
malicious information
learning (artificial intelligence)
Human behavior
ensembled semi-supervised approach
Engines
cybersecurity domain
computer security
Artificial Intelligence
AI systems
biblio
E-Government - Qualified Digital Signature Case Study
Submitted by grigby1 on Fri, 10/16/2020 - 10:14am
institutional websites
Web sites
security
Resiliency
resilience
qualified digital signature case
Qualified Digital Signature
pubcrawl
Portable document format
policy-based governance
Leiria
Law
Instruments
Autenticity
Human behavior
government data processing
Germanium
Electronic government
E-Government
documentation
digital signatures
digital format
Cybersecurity
computer application
collaboration
biblio
Identifying Indexes Affecting the Quality of E-Government Websites
Submitted by grigby1 on Fri, 10/16/2020 - 10:13am
policy-based governance
website quality assessment
website assessment
website
Web sites
Web design
user interaction
usability
security
Resiliency
resilience
Quality.
pubcrawl
privacy
Biological system modeling
navigation
information quality
Indexes
Index
human computer interaction
Human behavior
government data processing
Electronic government
e-government websites
E-Government
data privacy
Cybersecurity
collaboration
biblio
Adaptive Random Testing for XSS Vulnerability
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
Browsers
Cross Site Scripting
XSS testing tool
Subspace constraints
open source vulnerable benchmarks
headless browser
fuzzing method
common vulnerabilities
black-box testing tools
ART method
adaptive random testing
XSS vulnerability
fuzzing
security of data
Payloads
web applications
public domain software
program testing
cross-site scripting
Web sites
tools
internet
pubcrawl
Human behavior
Resiliency
Scalability
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »