Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Web sites
biblio
DDoS Mitigation and Intrusion Prevention in Content Delivery Networks using Distributed Virtual Honeypots
Submitted by aekwall on Mon, 06/29/2020 - 12:57pm
intrusion prevention
Web sites
Web demands
virtual honeypot
Servers
security issues
resource allocation issues
resource allocation
Resiliency
pubcrawl
Prevention
network security
Monitoring
mitigation
Metrics
IP networks
client Websites
intrusion
internet
Human behavior
distributed virtual honeypot model
Distributed Denial of Service (DDoS)
denial-of-service attack
DDoS security
DDoS Attacks
DDoS Attack Prevention
DDoS attack mitigation
Content distribution networks
content delivery networks
computer network security
Computer crime
composability
biblio
Improvement in Phishing Websites Detection Using Meta Classifiers
Submitted by grigby1 on Fri, 06/19/2020 - 11:49am
Phishing
WEKA
Web sites
trusted Web pages
Trusted Computing
smart devices
single classifier model
Scalability
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy-based governance
Phishing Websites Detection
phishing Websites
Accuracy
personal information
pattern classification
modern computers
meta classifiers
Meta Classifier
Internet security
internet
fraudulent websites
fraudulent practices
false trust
F-measure
ensemble classifiers
Computer crime
biblio
Implement Time Based One Time Password and Secure Hash Algorithm 1 for Security of Website Login Authentication
Submitted by aekwall on Mon, 06/08/2020 - 11:33am
process user authentication
hash algorithms
word length 160.0 bit
Website login authentication
website
username
user passwords
user access rights
time-based one time password
time limit
Time Based One Time Password
time 30.0 s
SHA1
Secure Hash Algorithm 1 generate code
Secure Hash Algorithm 1
authorisation
information system access
factor authentication method
authentication process
account number
two-factor authentication
Compositionality
Information systems
message authentication
authentication
Web sites
pubcrawl
Resiliency
Cryptography
biblio
Extractive Persian Summarizer for News Websites
Submitted by aekwall on Mon, 05/18/2020 - 10:55am
pre-processing
Web sites
tools
textual information
text analysis
statistical methods
statistical
sentence length
Semantics
semantic methods
Scalability
salient sentences
salient features
Resiliency
pubcrawl
automatic extractive text summarization
Persian news articles
natural language processing
Libraries
Human behavior
heuristical and semantical
heuristic methods
genetic algorithms
feature vector
feature extraction
extractive text summarization
extractive Persian summarizer
English words
Data mining
biblio
Dangers and Prevalence of Unprotected Web Fonts
Submitted by grigby1 on Fri, 04/17/2020 - 10:46am
Metrics
Web sites
Web Browser Security
Web
unprotected Web fonts
subresource integrity mechanism
stylesheets
SRI support
software vendors
software packages
software package
security-conscious users
Resiliency
resilience
pubcrawl
online front-ends
attack surface
maliciously modified version
malicious script
malicious font
internet
integrity
Human Factors
Human behavior
Google
fonts
fingerprint identification
Cryptography
cryptographic fingerprints verification
Compositionality
composability
CDNs
biblio
MANiC: Multi-step Assessment for Crypto-miners
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
profitability
Human Factors
malicious activities
Malicious URL
malware
Metrics
Multistep assessment
normal browser behaviour
online front-ends
Human behavior
pubcrawl
related CryptoJacking research
resilience
Resiliency
suspicious behaviour
Web Browser Security
Web sites
Web-based Threats
CPU-based mining
bitcoin
blacklisting
Browser Security
browser-hijacking
Browsers
Browsers host
composability
Compositionality
application program interfaces
Crypto-miners
Crypto-mining
crypto-mining scripts
cryptocurrencies
cryptojacking
CryptoJacking websites
Data mining
Drive-by Mining
biblio
Does Certificate Transparency Break the Web? Measuring Adoption and Error Rate
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
malicious certificates
Web sites
Error analysis
Certificate-Transparency
Computed tomography
CT
error rate
Google Chrome web browser
HTTPs
Compositionality
misissued certificates
search engines
security benefits
usable-security
Web-PKI
websites
Web Browser Security
security of data
Browsers
certificate transparency
Metrics
online front-ends
composability
internet
Ecosystems
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Servers
Monitoring
security
biblio
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists
Submitted by grigby1 on Fri, 04/17/2020 - 10:44am
resilience
mobile computing
modern phishing websites
native blacklisting
Organizations
PhishFarm framework
Phishing
phishing attacks
phishing kits
pubcrawl
mobile browsers
Resiliency
security
security of data
unsolicited e-mail
Web Browser Security
Web browsers
Web sites
web-browser
diverse cloaking techniques
anti-phishing-ecosystem
blacklisting
browser blacklists
browser phishing blacklists
Browsers
Cloaking
composability
Compositionality
Computer crime
anti-phishing entities
Ecosystems
evasion techniques
HTTP request
Human behavior
Human Factors
internet
live phishing sites
Metrics
biblio
The Creation Process of a Secure and Private Mobile Web Browser with no Ads and no Popups
Submitted by grigby1 on Fri, 04/17/2020 - 10:44am
Metrics
Web Browser Security
World Wide Web
Web sites
secure mode
private mode
mobile Web browser
Mobile Applications
hypermedia markup languages
HTML5 Web page
creation process
Browsers
Compositionality
security of data
online front-ends
mobile computing
composability
web services
internet
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Detecting Exploit Websites Using Browser-based Predictive Analytics
Submitted by grigby1 on Fri, 04/17/2020 - 10:44am
Cybersecurity
Web Browser Security
Web-based computing
Web sites
Web browsers
web browser vulnerabilities
tool development
threat detection
Predictive Analytics
machine learning-powered predictive analytical model
human computer interaction
Data Analytics
browser-based predictive analytics
Compositionality
learning (artificial intelligence)
Metrics
Information analysis
Web browser
composability
cyberattacks
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
machine learning
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »