Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Web pages
biblio
Malicious browser extensions: A growing threat: A case study on Google Chrome: Ongoing work in progress
Submitted by grigby1 on Wed, 01/16/2019 - 2:32pm
Servers
online front-ends
party developers
payment frauds
Phishing
popular browser
pubcrawl
Resiliency
security of data
Metrics
spying
traditional functionalities
Uniform resource locators
unsolicited e-mail
Videos
Web Browser Security
Web pages
affiliate fraud
malicious browser extensions
malicious browser extension
internet
Human behavior
Google Chrome
fraud
Electronic mail
current browsers
Computer crime
Compositionality
Browsers
browser extension platform
browser extension
attacks
attack possibilities
biblio
A Google Chromium Browser Extension for Detecting XSS Attack in HTML5 Based Websites
Submitted by grigby1 on Wed, 01/16/2019 - 2:32pm
Human behavior
XSS attack
Web sites
Web pages
Web Browser Security
tools
tags
security of data
Resiliency
pubcrawl
online front-ends
Metrics
input validation
hypermedia markup languages
Attack vectors
HTML5 based Web sites
Google Chromium browser extension
extensions
Electronic mail
cross-site scripting attack
cross-site scripting
cross document messaging
computer science
Compositionality
Browsers
Browser Security
Attributes
attribute abuse
biblio
Rendering Trustability to Semantic Web Applications-Manchester Approach
Submitted by grigby1 on Mon, 03/26/2018 - 12:55pm
Resiliency
Web pages
web of trust
University Ontology
Trusted Computing
trustability
trust
Syntactics
Semantics
semantically annotated tags
semantic Web documents
semantic Web applications-manchester approach
Semantic Web
composability
resilience
pubcrawl
Provenance
OWL
Ontology
ontologies (artificial intelligence)
Ontologies
Manchester Syntax
Intelligent web
intelligent knowledge retrieval
information retrieval
Data models
biblio
Detecting DOM-Sourced Cross-Site Scripting in Browser Extensions
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
shadow DOM
JavaScript engines
metadata
online front-ends
program diagnostics
program testing
pubcrawl
resilience
Resiliency
Scalability
security of data
JavaScript
static analysis
text analysis
text filter
trees (mathematics)
Uniform resource locators
web applications
Web pages
web security
XSS vulnerabilities
DOM-sourced XSS
application program interfaces
browser extension vulnerability
browser extensions
Browsers
client-side vulnerabilities
computational linguistics
Cross Site Scripting
Cross Site Scripting (XSS)
Document Object Model
DOM-sourced cross-site scripting detection
abstract syntax tree parser
dynamic symbolic execution
HTML documents
HTML5 API
Human behavior
human factor
Human Factors
hypermedia markup languages
internet
Java
biblio
Inhibiting Browser Fingerprinting and Tracking
Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
privacy
Web Tracking
Web sites
Web servers
Web pages
Web Browser Security
Web browser
user privacy
user computer
user browser experience
side-effects
Resiliency
pubcrawl
Browser Fingerprinting
online front-ends
Metrics
internet
Human behavior
Fingerprint recognition
Fingerprinting Countermeasure
fingerprint identification
data privacy
browser tracking
Browsers
browser fingerprinting identification
biblio
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing
Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
testing
program testing
programming error
pubcrawl
public domain software
Resiliency
security
security of data
security unit testing approach
program diagnostics
unit test execution framework
Unit testing
untrusted data sanitization
Web Browser Security
Web page context
Web pages
XSS attacks
XSS vulnerability
grammar-based attack generator
Attack generation
automated unit testing
automatic programming
Browsers
cross-site scripting vulnerabilities detection
Data Sanitization
encoder
encoding
Cross Site Scripting
grammars
HTML
Human behavior
injection attacks
Java
Metrics
open source medical records application
program analysis
biblio
Automatic Web Security Unit Testing: XSS Vulnerability Detection
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
testing
pubcrawl
Resiliency
Sanitization evaluation
security
security of data
Security test harness
software developers
static analysis tools
program testing
Unit testing
vulnerability detection
Web application
Web pages
Web security unit testing
XSS attack strings
XSS vulnerability detection
encoding function
automatic testing approach
Browsers
command line injection
Compositionality
Context
Cross Site Scripting
Cross-site scripting (XSS)
encoding
Attack generation
HTML
Human behavior
Human Factors
internet
Metrics
program analysis
program diagnostics
biblio
Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web
Submitted by grigby1 on Fri, 11/03/2017 - 11:29am
government data processing
Web resource discovery
Web pages
Uniform resource locators
Tor
Terrorism
surface Web
search engines
information retrieval
I2P
hybrid focused crawling
homemade explosives discovery
pubcrawl
Freenet
focused crawling
explosives
Darknets
Crawlers
Context
classifier-guided hyperlink selection strategy
internet
dark web
Human Factors
Human behavior
biblio
Two for the price of one: A combined browser defense against XSS and clickjacking
Submitted by grigby1 on Thu, 04/20/2017 - 12:37pm
Information filters
XSS attack vector
XBuster
web security
Web pages
Web application threat
security of data
Resiliency
pubcrawl
partial script injection
online front-ends
Mozilla Firefox browser
JavaScript
Java
internet
attack vector
Human behavior
HTTP request parameter
HTML injection
HTML
Engines
Cross Site Scripting
Context
composability
client-side defence
clickjacking
Browsers
browser defense
browser
attribute injection
biblio
P2V: Effective Website Fingerprinting Using Vector Space Representations
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
online activists
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl170109
passive traffic analysis attack
packet to vector approach
P2V
anonymous communication
natural language processing
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
Context
Computer crime
Computational modeling
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »