Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Web sites
biblio
Phishing websites classifier using polynomial neural networks in genetic algorithm
Submitted by grigby1 on Wed, 12/20/2017 - 12:07pm
genetic algorithms
Web sites
Statistics
Sociology
pubcrawl
phishing Websites classifier
Phishing
neural networks techniques
Neural networks
Neural network (NN)
neural nets
improved polynomial neural networks
Human Factors
Human behavior
AI techniques
Genetic Algorithm (GA)
genetic algorithm
Error analysis
data structures
data structure
Data mining
data classification
Computer crime
classification techniques
chromosome recombination operators
brain
Artificial Intelligence
biblio
Using synthetic data to train neural networks is model-based reasoning
Submitted by grigby1 on Wed, 12/20/2017 - 12:03pm
Captcha-breaking architecture
human beings
wikipedia
Training
task-specific posterior uncertainty
synthetic-data generative model
synthetic training data
proposal distribution generator learning
Neural networks
neural network training
neural network parameter optimization
neural network generalization
model-based reasoning
Facebook
Computational modeling
pubcrawl
Bayesian model-based reasoning
approximate inference
captchas
CAPTCHA
neural nets
Generators
social networking (online)
Web sites
Training data
learning (artificial intelligence)
Data models
composability
Human Factors
Human behavior
biblio
Large-Scale Analysis Detection of Authentication Cross-Site Request Forgeries
Submitted by K_Hooper on Wed, 12/20/2017 - 10:33am
Metrics
Web sites
Web site authentication
Web Browser Security
web applications
testing
security testing strategies
security of data
Resiliency
public domain software
pubcrawl
open-source penetration testing tool OWASP ZAP
Microsoft
Auth-CSRF
large-scale analysis
identity management functionalities
Human behavior
History
Google
experimental analysis
eBay
CSRF-checker
Browsers
authentication CSRF
authentication cross-site request forgery detection
authentication
biblio
Inhibiting Browser Fingerprinting and Tracking
Submitted by K_Hooper on Wed, 12/20/2017 - 10:33am
privacy
Web Tracking
Web sites
Web servers
Web pages
Web Browser Security
Web browser
user privacy
user computer
user browser experience
side-effects
Resiliency
pubcrawl
Browser Fingerprinting
online front-ends
Metrics
internet
Human behavior
Fingerprint recognition
Fingerprinting Countermeasure
fingerprint identification
data privacy
browser tracking
Browsers
browser fingerprinting identification
biblio
Efficient Method for Analyzing Malicious Websites by Using Multi-Environment Analysis System
Submitted by K_Hooper on Wed, 12/20/2017 - 10:33am
multienvironment analysis system
Web sites
Web client environments
Web Browser Security
Uniform resource locators
system monitoring
security of data
Resiliency
Relays
pubcrawl
obfuscation code decoding
obfuscated javascript
multimodal analysis
Browsers
multi-environment analysis
Metrics
malware
malicious Web sites
internet
Human behavior
Electronic mail
dynamic analysis
drive-by download attack
Decoding
Data mining
data analysis
biblio
Introduction to HTTP security headers and implementation of HTTP strict transport security (HSTS) header for HTTPS enforcing
Submitted by K_Hooper on Wed, 12/20/2017 - 10:33am
Metrics
Web sites
Web servers
Web browsers
Web Browser Security
transport protocols
SSL-TLS certificates
security policies
security of data
security
Resiliency
pubcrawl
Protocols
Browsers
IoT
Internet of Things
internet
hypermedia
Human behavior
HTTPS protocol
HTTP strict transport security header
HTTP protocol
HSTS
Computer crime
communication security
biblio
Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots
Submitted by grigby1 on Mon, 11/27/2017 - 11:30am
Web search crawler
multiple honeypot
pattern classification
Ports (Computers)
pubcrawl
Resiliency
vulnerability detection
vulnerability scanning detection
Web crawling
Metrics
Web servers
Web Service
web services
Web site
Web sites
Web vulnerability
web-based attacks
features of collective accesses
classification
collective access feature
Compositionality
computer network security
Conferences
crawler classification
Crawlers
decoy Web honeypot
attack prevention
Google
Human behavior
Human Factors
information collection
Intrusion Detection
IP networks
malicious threat
biblio
Mining the Dark Web: Drugs and Fake Ids
Submitted by grigby1 on Fri, 11/03/2017 - 10:28am
data wrangling
Web sites
Weapons
Tor
The Silk Road
Roads
nonstandard communication protocols
law administration
internet
illegal item marketplace
governmental bodies
FBI
fake ids
Europol
etl processing
drugs
security
Data mining
Data collection
dark Web mining
dark Web marketplaces
dark web
counterfeit documents
bitcoins
authomation
Agora
security of data
cryptocurrencies
Human Factors
Human behavior
pubcrawl
biblio
A comprehensive inspection of cross site scripting attack
Submitted by grigby1 on Thu, 04/20/2017 - 11:38am
JavaScript
XSS vulnerability
XSS preventive measures
Web sites
Visual BASIC
VBScript
Uniform resource locators
Stored XSS
Servers
sensitive information access
security of data
Resiliency
Reflected XSS
pubcrawl
malware
malicious XSS link
ActiveX
Java
hypermedia markup languages
Human behavior
HTML
Flash
Electronic mail
Domed based XSS
Cross site scripting attack (XSS)
cross site scripting attack
Cross Site Scripting
computer security threat
composability
Browsers
automation
biblio
An analysis of XSS, CSRF and SQL injection in colombian software and web site development
Submitted by grigby1 on Thu, 04/20/2017 - 11:38am
Human behavior
XSS
websites
Web sites
web security
web applications
SQL injection
SQL
software engineering
software development
Software
security protocols
Resiliency
pubcrawl
internet
Colombian companies
hacking protection
Hacking
Economics
Databases
CSRF
Cross Site Scripting attacks
Cross Site Scripting
Cross Site Request Forgery
Computer crime
composability
Colombian Web Site development
Colombian software development
Colombian organizations
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »