Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
web applications
biblio
Trustworthiness Assessment of Web Applications: Approach and Experimental Study using Input Validation Coding Practices
Submitted by aekwall on Mon, 12/07/2020 - 11:30am
Assessment
assessment techniques
coding practices
composability
feasible security practices results
input validation coding practices
input validation practices
internet
pubcrawl
quality model
secure code
security of data
security perspective
security vulnerabilities
software quality
software security
trustworthiness
trustworthiness assessment
vulnerabilities
Web application
web applications
biblio
Adaptive Random Testing for XSS Vulnerability
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
security of data
Scalability
Resiliency
Human behavior
pubcrawl
internet
tools
Web sites
cross-site scripting
program testing
public domain software
web applications
Payloads
Browsers
fuzzing
XSS vulnerability
adaptive random testing
ART method
black-box testing tools
common vulnerabilities
fuzzing method
headless browser
open source vulnerable benchmarks
Subspace constraints
XSS testing tool
Cross Site Scripting
biblio
Practical Combinatorial Testing for XSS Detection using Locally Optimized Attack Models
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
security of data
Scalability
Resiliency
Human behavior
pubcrawl
internet
tools
cross-site scripting
Grammar
program testing
Web application
application security
formal verification
XSS
JavaScript
cross-site scripting vulnerabilities
Black box testing
black-box security testing
combinatorial testing
combinatorial testing methodology
locally optimized attack models
modelling approach
modelling scheme
security testing
security testing tool
test case generation
test oracle
Verification Framework
web applications
XSS attack vectors
XSS detection
XSSInjector
Cross Site Scripting
biblio
Automated Repair of Cross-Site Scripting Vulnerabilities through Unit Testing
Submitted by aekwall on Mon, 09/28/2020 - 11:33am
security of data
Scalability
Resiliency
Human behavior
pubcrawl
internet
web applications
Web sites
program testing
program analysis
software maintenance
program diagnostics
software reliability
online front-ends
Web pages
sensitive information
fraud
static program analysis
application vulnerable
commit frauds
common programming error
Cross Site Scripting attacks
cross site scripting(XSS)
cross-site scripting vulnerabilities
detecting vulnerable web pages
dynamic program analysis
injection attacks
open source medical record application
software debugging
suggested encoder
Unit testing
untrusted data
untrusted dynamic content
vulnerability repair
vulnerable codes
XSS vulnerability
Cross Site Scripting
biblio
Challenges in Automation of Test Cases for Mobile Payment Apps
Submitted by aekwall on Mon, 07/27/2020 - 11:20am
security of data
mobile computing
Resiliency
pubcrawl
Metrics
internet
program testing
testing
automation
software engineering
web applications
Mobile Applications
smart phones
Human Factors
electronic money
android
Android (operating system)
Androids
Humanoid robots
Compositionality
iOS (operating system)
ios
Automatic Test Cases
Automatic testing
mobile based payment application
Mobile Payment Application
Mobile Testing
software development life cycle
Software Testing
test case automation
iOS Security
biblio
Fast Detection and Mitigation to DDoS Web Attack Based on Access Frequency
Submitted by aekwall on Mon, 06/29/2020 - 11:47am
access frequency
attack packets
botnet
composability
Computer crime
data structures
DDoS attack detection
DDoS Attacks
DDoS Detection and Mitigation
DDoS attack mitigation
DDoS Web attack
hacker botnets
Human behavior
immediate defense mechanism
internet
IP networks
Metrics
Processing time
Protocols
pubcrawl
realtime attack response
Resiliency
security of data
storage space
Time-frequency Analysis
web applications
Web request
Web servers
biblio
Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal
Submitted by aekwall on Mon, 06/08/2020 - 10:32am
Cryptography
encryption
Resiliency
pubcrawl
Databases
web applications
password
Ciphers
Portals
Compositionality
Hash functions
file organisation
enhanced secure hash algorithm-512
hash collisions
Hash Function
hash message
hash tables
Internet security
matrix encryption key
password hashing
salt algorithm
salt generation
secured web portal
SHA-1
web portal
hash algorithms
biblio
FalconEye: A High-Performance Distributed Security Scanning System
Submitted by grigby1 on Fri, 04/10/2020 - 11:53am
security of data
Servers
Monitoring
Scalability
computer architecture
internet
Task Analysis
pubcrawl
Metrics
Resiliency
resilience
Human behavior
Uniform resource locators
web security
application security
common vulnerabilities test environment
conventional platform
detection systems
distributed scanning system
existing security vulnerabilities
FalconEye system
generic vulnerabilities scanning
great precision
high-performance distributed security scanning system
human society
important transactions
input module
input source module
malicious users
open source framework
public domain software
scanner module
secure practices
sensitive data
Spider
support platform module
Vulnerability Scanning System
web applications
Web developers
web vulnerabilities
Pervasive Computing Security
Human Factors
biblio
Security Analytics For Heterogeneous Web
Submitted by grigby1 on Wed, 02/26/2020 - 3:42pm
business data processing
data analysis
dynamic PAA
feature extraction
heterogeneous Web
internet
learning (artificial intelligence)
machine learning
machine learning algorithms
Measurement
Metrics
pattern classification
privacy
proactive behavior
Probabilistic Arithmetic Automata(PAA)
Probabilistic logic
pubcrawl
reconfigurable PAA
security
security analytics
security of data
Support Vector Machine (SVM) Classifier
Support vector machines
SVM classifier
threat vectors
tools
vulnerability detection tools
web applications
web services
biblio
Automated Combinatorial Testing for Detecting SQL Vulnerabilities in Web Applications
Submitted by grigby1 on Mon, 02/10/2020 - 10:27am
attack grammars
automated combinatorial testing
automated SQL injection vulnerability testing
collaboration
combinatorial testing
combinatorial testing methodology
concrete attack vectors
Databases
Grammar
gray-box testing
gray-box testing method
Human behavior
internet
Metrics
policy-based governance
privacy
program testing
pubcrawl
resilience
Resiliency
security of data
security testing
SQL
SQL database backend
SQL detection
SQL injection
SQL injection vulnerabilities
SQL vulnerabilities detection
Syntactics
tools
web applications
1
2
3
4
5
next ›
last »