Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Web sites
biblio
A dark web story in-depth research and study conducted on the dark web based on forensic computing and security in Malaysia
Submitted by grigby1 on Wed, 09/12/2018 - 10:15am
URL
website links
skynet
Malaysia
forensic computing
dark web story
dark web security
cryptocurrency
Government
Instruments
pubcrawl
Digital Forensics
dark web
Web sites
internet
drugs
Conferences
malware
Human Factors
Human behavior
biblio
Result evaluation of field authentication based SQL injection and XSS attack exposure
Submitted by grigby1 on Thu, 06/07/2018 - 2:13pm
Servers
policy-based governance
Policy-Governed Secure Collaboration
privacy
profited businesses
pubcrawl
Resiliency
security imperatives
security issues
Policy
SQL
SQL infusion
SQL injection
Structured Query Language
web based business
web communications
Web sites
XSS attack exposure
document processing
centralized mechanism
collaboration
Computer crime
Cross Site Scripting (XSS)
cross webpage scripting
cross-site scripting
data trades
Databases
authentication
electronic framework association
electronic frameworks
field authentication
framework
Human behavior
information classification
message authentication
pattern classification
biblio
Testing Techniques and Analysis of SQL Injection Attacks
Submitted by grigby1 on Thu, 05/24/2018 - 11:08am
SQL Injection vulnerability
resilience
Resiliency
security of data
security systems
security testing
sensitive data
sensitive information
SQL
SQL injection
SQL Injection attacks
SQL injection problems
relational databases
SQL query
testing techniques
three-tier-architecture
traditional security policies
user interfaces
users
Web application vulnerabilities
web applications
Web sites
website
handy interface
attackers
Cogeneration
commonly used Web application attacks
composability
Data protection
database-driven Web applications
DH-HEMTs
different security systems
effective data protection systems
good target
governmental organizations
attack
Human behavior
integrated circuits
internet
Knowledge engineering
Metrics
penetration testing technique
program testing
proper data protection
pubcrawl
relational database security
biblio
Hardening the Client-Side: A Guide to Enterprise-Level Hardening of Web Browsers
Submitted by K_Hooper on Wed, 05/09/2018 - 10:00am
security
least privilege tailored configurations
multiple web browsers
online front-ends
Organizations
Phishing
Plugin-based attacks
pubcrawl
Resiliency
Scalability
Secure Configuration
least privilege browser hardening
Security by Default
security of data
Servers
tools
un-trusted sites
Vegetation
web browser hardening
Web browsers
Web sites
Windows-based enterprise
enforced configuration
Browsers
business data processing
classic client desktop infrastructure
Computers
critical enterprise sites
critical trusted websites
cyber-compromise
Cybersecurity
data breaches
default configurations
attack avenues
enterprise-level hardening
enterprise-wide strategy
Google Chrome
Hardening
high-granularity tailored configurations
internet
Internet Explorer
JavaScript attacks
least privilege
biblio
Web Caching Evaluation from Wikipedia Request Statistics
Submitted by grigby1 on Mon, 03/26/2018 - 11:54am
Servers
Zipf distributed requests
wireless networks
Wikipedia request statistics
Wikipedia pages
Wikipedia daily top-1000 statistics
Wikipedia caches
Web sites
web caching strategies
Web caching evaluation
Web Caching
statistical analysis
simulation
access time reduction
Scalability
Resiliency
resilience
pubcrawl
Metrics
internet
hit rate
Encyclopedias
Electronic publishing
Conferences
cache storage
biblio
Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Submitted by grigby1 on Mon, 03/19/2018 - 12:37pm
Intrusion Detection
wireless LAN
Wi-Fi
Web sites
web browsing behavior
Web browsing
stylometry
Software Architecture
pubcrawl
parallel binary decision fusion architecture
online front-ends
multimodal biometric systems
Mobile handsets
Metrics
message authentication
Keyboards
Active Authentication
insider threat
Humanoid robots
Human behavior
GPS location
Global Positioning System
geographical colocation
decision fusion
biometrics (access control)
Behavioral biometrics
authentication
application usage patterns
Androids
Android mobile device
Android (operating system)
biblio
Random forest explorations for URL classification
Submitted by grigby1 on Wed, 12/20/2017 - 12:08pm
Phishing
Web sites
URL classification
unsolicited e-mail
Uniform resource locators
Training
testing
Random forest explorations
Radio frequency
pubcrawl
phishing Websites
blacklisting
pattern classification
machine learning algorithms
learning (artificial intelligence)
internet
Human Factors
Human behavior
feature extraction
Computer crime
common defence users
Classification algorithms
biblio
Shellcode detector for malicious document hunting
Submitted by grigby1 on Wed, 12/20/2017 - 12:08pm
malicious documents
Web sites
Web site
tools
simple encryption method
shellcode detector
shellcode
pubcrawl
Portable document format
Phishing
open-source tools
object retrieval
network threat
malware
advanced persistent threat attacks
malicious document hunting
malicious document detector
information retrieval
Human Factors
Human behavior
feature extraction
encryption
Electronic mail
document handling
Detectors
Computer crime
APT attack techniques
advanced persistent threats
biblio
Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model
Submitted by grigby1 on Wed, 12/20/2017 - 12:07pm
Human Factors
Web sites
user interface support
transport protocols
security
representative Webpage
pubcrawl
psychology
phishing Websites
phishing detection scenario
phishing attacks
Phishing
Knowledge engineering
ACT-R cognitive behaviour architecture model
human detection
human behaviour
Human behavior
HTTPS padlock security indicator
Decision Making
computer science
computer network security
computer model
Computer crime
computer architecture
Computational modeling
biblio
Phishing detection: A recent intelligent machine learning comparison based on models content and features
Submitted by grigby1 on Wed, 12/20/2017 - 12:07pm
pubcrawl
Phishing
phishing attacks
phishing datasets
Phishing Detection
phishing detection rate
Predictive Metrics
Predictive models
predictive security metrics
online community
security
tools
Training
Trusted Computing
trusted Websites
Web sites
Web Threat
World Wide Web
Human behavior
Artificial Neural Networks
Classification algorithms
Computer crime
computer security
data analysis
Decision trees
fake Websites
financial assets
anti-phishing tools
Human Factors
intelligent machine learning comparison
internet
learning (artificial intelligence)
machine learning
ML predictive models
online attack
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »