Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Web sites
biblio
Automated Repair of Cross-Site Scripting Vulnerabilities through Unit Testing
Submitted by aekwall on Mon, 09/28/2020 - 12:33pm
software debugging
commit frauds
common programming error
Cross Site Scripting attacks
cross site scripting(XSS)
cross-site scripting vulnerabilities
detecting vulnerable web pages
dynamic program analysis
injection attacks
open source medical record application
application vulnerable
suggested encoder
Unit testing
untrusted data
untrusted dynamic content
vulnerability repair
vulnerable codes
XSS vulnerability
Cross Site Scripting
program analysis
Scalability
Resiliency
Human behavior
pubcrawl
internet
web applications
Web sites
program testing
security of data
software maintenance
program diagnostics
software reliability
online front-ends
Web pages
sensitive information
fraud
static program analysis
biblio
Exploring Adversaries to Defend Audio CAPTCHA
Submitted by grigby1 on Fri, 09/11/2020 - 11:44am
bots
captchas
CAPTCHA
adversarial audio captcha
adversarial audio datasets
adversarial examples attack
attack accuracy
basic iterative method
BIM
Noise measurement
deepFool
distortion
medium background noise
near-sighted users
single audio captcha
spoken digits
Web-based authentication method
websites
composability
authorisation
machine learning
machine learning algorithms
security
pubcrawl
Human behavior
internet
deep learning
learning (artificial intelligence)
Classification algorithms
neural nets
Speech recognition
deep learning models
Web sites
attack models
handicapped aids
biblio
Enhanced Honey Encryption Algorithm for Increasing Message Space against Brute Force Attack
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
Human Factors
brute force attacks
user data protection algorithm
message transmission
message space limitation problem
message space limitation
honeywords generation method
honey encryption algorithm
distribution transforming encoder
distribution probability theory
Distribution functions
discrete distribution function
cumulative distribution function
CDF
Brute Force Attack
policy-based governance
Cryptography
encoding
password
Databases
Web sites
Force
Data protection
Decoding
collaboration
pubcrawl
probability
Data Security
honey encryption
unauthorized access
authorisation
encryption
biblio
FACT - Fine grained Assessment of web page CredibiliTy
Submitted by aekwall on Mon, 07/13/2020 - 11:19am
health domain Web pages
automated
automated genre-aware credibility assessment
Credibility
crowdsourced Web
fine grained assessment
GCS
genre
genre credibility score
gradient boosted decision tree classified genres
supervised learning
quality
search engine queries
trillion web pages
web assessment
web of trust
Web page
Web page credibility
WEBCred framework
WOT
text analysis
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
internet
tools
Web sites
security of data
software engineering
information retrieval
information security
Decision trees
search engines
Web pages
framework
ranking
biblio
Mitigation of Cryptojacking Attacks Using Taint Analysis
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Resiliency
malware
man-in-the-middle
man-in-the-middle attack
Metrics
mitigation
online front-ends
pubcrawl
resilience
malicious cryptocurrency mining
script characteristics
security of data
taint analysis
taint analysis method
threat model
Web site background
Web sites
abuse case
in-browsercryptojacking mitigation
Human Factors
Human behavior
Google Chrome
Data mining
cryptomining
cryptojacking
Cryptography
cryptocurrency
cross-site scripting
CPU usage
CPU resources
Central Processing Unit
Browsers
Attack Modeling
biblio
The Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the Web
Submitted by grigby1 on Fri, 07/10/2020 - 1:07pm
heavily obfuscated code
Web sites
under-the-hood practices
stealthy mining operations
Resiliency
resilience
pubcrawl
parasitic miners
online front-ends
mining prevention plug-ins
mining code
Metrics
learning (artificial intelligence)
Human Factors
Human behavior
browser code
hardware-assisted profiling
Hardware
exploitative exercise
Data mining
cryptojacking
Cryptography
cryptocurrency market
cryptocurrency
covert mining operations
countering cryptojacking
Computer hacking
Browsers
browser extension
browser cryptojacking
biblio
Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
Submitted by grigby1 on Fri, 07/10/2020 - 1:07pm
Human Factors
Web sites
Web browser fingerprinting
Unsupervised Learning
static analysis
Resiliency
resilience
pubcrawl
Metrics
malicious JavaScript codes
Java
internet
in-browser cryptojacking
code complexities
Human behavior
economic analysis
dynamic analysis
dropzone cryptojacking server
cryptojacking scripts
cryptojacking attackers
cryptojacking
Cryptography
computer network security
codes
code-based categorization
biblio
Dark Web Along With The Dark Web Marketing And Surveillance
Submitted by grigby1 on Fri, 07/10/2020 - 11:54am
Human behavior
WebMarketing
Web sites
Weapons
Terrorism
terror activities
surveillance programs
surveillance
pubcrawl
law enforcement agencies
law enforcement
invasive software
internet
Human Factors
Computer crime
drugs
darkweb
dark Web sites
dark Web marketing
dark Web jihadist services
dark web
Daniel onion.
cybercrimes
cyber criminals
criminal law
Conferences
Computer hacking
biblio
Investigating the Streaming Algorithms Usage in Website Fingerprinting Attack Against Tor Privacy Enhancing Technology
Submitted by aekwall on Mon, 07/06/2020 - 9:57am
pubcrawl
Website fingerprinting attack
Web sites
Web site fingerprinting attack
traffic analysis attack
Tor
telecommunication traffic
streaming algorithm
statistical flow-based network traffic features
Scalability
Resiliency
representative data stream classification algorithms
concept drift
probability
policy-based governance
pattern classification
online front-ends
Metrics
learning (artificial intelligence)
Human behavior
dynamic Web sites
data privacy
cryptology
biblio
SANUB: A new method for Sharing and Analyzing News Using Blockchain
Submitted by aekwall on Mon, 07/06/2020 - 9:56am
decentralized applications
SANUB
reporter validation
reliable decentralized network
news ownership
news leads
news evaluation
news broadcasting process
News Broadcasting
news agencies
fake news detection
fake news creation
fake news
Scalability
cryptology
text analysis
Web sites
internet
smart contract
blockchain
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Cryptography
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »