Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Web pages
biblio
Real-time classification of malicious URLs on Twitter using machine activity data
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
malware
Web pages
user machines
Uniform resource locators
Twitter data
Twitter
Superbowl
social networking (online)
real-time systems
real-time malicious URL classification
pubcrawl170109
pattern classification
online social networks
Computer crime
malicious software behaviour
malicious software
malicious server
machine classification system
machine activity logs
machine activity data
invasive software
drive-by-download
Data models
cyber criminals
Cricket World Cup
biblio
DC scanner: Detecting phishing attack
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
hypermedia markup languages
who is command
Web pages
visualization
URL verification
Servers
Script scanning
script codes
pubcrawl170109
phishing attack probability
internet
Computer crime
HTML contents
Electronic mail
e-mail based phishing attack detection
domain related authority details
domain name
DC scanner
Data mining
data analysis
cyber-attacks
Content analysis
biblio
"P2V: Effective Website Fingerprinting Using Vector Space Representations"
Submitted by grigby1 on Thu, 02/23/2017 - 12:45pm
natural language processing
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl
passive traffic analysis attack
packet to vector approach
P2V
online activists
anonymous communication
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
pubcrawl170105
Context
Computer crime
Computational modeling
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 2:03pm
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 10:32am
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
A Practical Experience on the Impact of Plugins in Web Security
Submitted by BrandonB on Tue, 05/05/2015 - 10:53am
security of data
web security
Web pages
web applications
Web application plugin vulnerabilities
vulnerabilities
testing
static code analysis tools
static analysis
SQL injection vulnerabilities
content management
security
program diagnostics
plugins
Manuals
internet
false positive rates
Databases
Cross Site Scripting
content management system
biblio
Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack
Submitted by BrandonB on Tue, 05/05/2015 - 10:52am
SQL injection
XSS
Web vulnerability detection model
Web pages
web applicationt
Web application vulnerabilities
Web application
vulneralbilities
Uniform resource locators
testing
system cracker
structured query language injection
SQL injection attack
authorisation
SQL
security
internet
hacking tutorials
hacking tools
Databases
CSRF
cross-site scripting
cross-site request forgery
Computer crime
Computational modeling
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
Data-centric phishing detection based on transparent virtualization technologies
Submitted by BrandonB on Thu, 04/30/2015 - 1:47pm
human perceptual similarity
antiphishing solution
Browsers
cloud
Cloud Computing
color-based fingerprint extraction
color-based fingerprint filtering
color-based fingerprint scaling
component isolation
computer architecture
Computer crime
Data mining
data-centric phishing detection
Detectors
Web sites
Image color analysis
malware
man-in-the-browser attack
MitB attack
online front-ends
phishing attacks
spoofed Web pages
transparent virtualization technologies
virtual machines
virtualisation
VM introspection
VMI
Web pages
biblio
Third-Party Web Tracking: Policy and Technology
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
security
Web sites
Web privacy
Web pages
Web innovation
user browsing activity tracking
third-party Web tracking
third-party Web sites
third-party tracking
social networking
advertising
privacy
History
fourth party Web measurement platform
Economics
Do Not Track
data privacy
Companies
analytics
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »