Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
SQL
biblio
IoT Object Security towards On-off Attack Using Trustworthiness Management
Submitted by aekwall on Mon, 12/21/2020 - 12:35pm
security of data
Servers
Internet of Things
pubcrawl
composability
Databases
SQL
authentication
network topology
trustworthiness
Topology
Attack detection
MQTT
IoT object security
trustworthiness management
MySQL database
Object
on-off attack
On-offAttack
PHP database
time 0.5518318 s
trust value security
biblio
An Automated Composite Scanning Tool with Multiple Vulnerabilities
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
computer network security
Scalability
network security
Resiliency
Human behavior
pubcrawl
SQL injection
SQL
network security protection
detection method
system vulnerabilities
Cross-site Scripting Attacks
automated composite scanning tool
composite detection tool
directory traversal
frequent vulnerabilities
multiple vulnerabilities
the vulnerability detection module
vulnerability detection module
Cross Site Scripting
biblio
Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things
Submitted by grigby1 on Fri, 09/18/2020 - 1:08pm
Internet of Things
learning (artificial intelligence)
security of data
machine learning
data analysis
pubcrawl
resilience
Resiliency
intrusion detection system
Intrusion Detection
production engineering computing
composability
network security
Protocols
Structured Query Language
Metrics
vulnerability assessment
cyber-attacks
machine learning (ML)
SQL
IDS
Big Data Analytics
electromagnetic interference
cyber attack
cyber-vulnerability assessment
IIoT systems
Industrial Internet of Things
Industrial Internet of Things (IIoT)
intrusion detection solutions
structuredquery language injection attacks
supervisory control and data acquisition (SCADA)
command injection attacks
biblio
Rapid prototyping of flow-based detection methods using complex event processing
Submitted by grigby1 on Fri, 09/04/2020 - 2:25pm
security
computer network security
IP networks
Monitoring
network security
pubcrawl
collaboration
Force
Uniform resource locators
Databases
Human Factors
transport protocols
policy-based governance
Engines
CEP
complex event processing
detection method
EPL
ESPER
Event Processing Language
flow-based detection methods
multistage HTTP brute force attack detection
network attacks
network flows
SQL
SQL-like syntax
brute force attacks
biblio
High-risk Problem of Penetration Testing of Power Grid Rainstorm Disaster Artificial Intelligence Prediction System and Its Countermeasures
Submitted by aekwall on Mon, 06/01/2020 - 9:54am
application security
Artificial Intelligence
artificial storm prediction system
Companies
composability
disaster prediction information systems
disasters
electric power information system security defense work
electrical safety
energy Internet disaster safety
energy internet disaster security
host security
information security
Information systems
internet
Internet of Things
middleware
middleware security
network security
password
Penetration Testing
PGRDAIPS
policy-based governance
power engineering computing
power grid rainstorm disaster artificial intelligence prediction system
power grid storm disasters
power grids
power Internet of Things
power meteorological service technology support
power system security
power transformer testing
program debugging
pubcrawl
resilience
Resiliency
security of data
SQL
SQL blind bug
SQL injection
SQL injection attack behavior
SQL injection penetration test
Storms
system penetration testing
Vulnerability
biblio
Machine Learning and Social Media to Mine and Disseminate Big Scientific Data
Submitted by grigby1 on Fri, 05/22/2020 - 1:43pm
atmospheric radiation measurement data center
big scientific data
Data discovery
data dissemination
Data mining
data retrieval
data streams
data-intensive projects
Database languages
database queries
Databases
easy search
environmental data centers
Human behavior
information dissemination
Laboratories
learning (artificial intelligence)
machine learning
machine learning framework
natural language processing
Oak Ridge National Laboratory
ORNL
pubcrawl
query processing
relational databases
resilience
Resiliency
Scalability
scientific data mining
scientific databases
social media
social media interaction
social networking (online)
SQL
SQL language
SQL queries
stream pipelining
structured databases
Structured Query Language
Twitter
biblio
Conversion of Natural Language Query to SQL Query
Submitted by grigby1 on Fri, 05/22/2020 - 1:43pm
Conferences
Data Dictionary
Databases
Dictionaries
Human behavior
natural language processing
natural language query
pubcrawl
query processing
relational database management system
relational databases
resilience
Resiliency
Scalability
Semantic
Semantics
speech format
speech-to-text
SQL
SQL query
Structured Query Language
student database
Syntactic
text format
biblio
Impact of SQL Injection in Database Security
Submitted by aekwall on Mon, 04/20/2020 - 9:44am
authorisation
encryption
advanced encryption standard
Resiliency
Human behavior
pubcrawl
composability
Metrics
standards
SQL injection
Databases
SQL
SQL injection attack
public key cryptography
Elliptic curve cryptography
relational databases
ECC
relational database security
AES
Database Security
cracking technique
dangerous hacking technique
database information
Elliptical Curve Cryptography
hybrid encryption
world web applications
biblio
PriDe: A Quantitative Measure of Privacy-Loss in Interactive Querying Settings
Submitted by aekwall on Mon, 04/20/2020 - 9:31am
data privacy
Data models
pubcrawl
privacy
Metrics
query processing
Databases
SQL
SQL query
Analytical models
Urban areas
Loss measurement
behavioural profiles
Electronic Privacy
interactive querying settings
N-gram model
PriDe measure
privacy-loss score
quantitative measure
querying behaviour
relational database management systems
privacy models and measurement
biblio
Automated Combinatorial Testing for Detecting SQL Vulnerabilities in Web Applications
Submitted by grigby1 on Mon, 02/10/2020 - 10:27am
attack grammars
automated combinatorial testing
automated SQL injection vulnerability testing
collaboration
combinatorial testing
combinatorial testing methodology
concrete attack vectors
Databases
Grammar
gray-box testing
gray-box testing method
Human behavior
internet
Metrics
policy-based governance
privacy
program testing
pubcrawl
resilience
Resiliency
security of data
security testing
SQL
SQL database backend
SQL detection
SQL injection
SQL injection vulnerabilities
SQL vulnerabilities detection
Syntactics
tools
web applications
1
2
3
4
5
next ›
last »