Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
SQL injection
biblio
An Analysis of Effectiveness of Black-Box Web Application Scanners in Detection of Stored SQL Injection and Stored XSS Vulnerabilities
Submitted by grigby1 on Wed, 02/10/2021 - 12:22pm
Black-box scanners
Cross Site Scripting
cross-site scripting
Databases
Human behavior
Manuals
Payloads
pubcrawl
resilience
Resiliency
Scalability
SQL injection
stored SQLI
Stored XSS
Uniform resource locators
Web pages
biblio
An Automated Composite Scanning Tool with Multiple Vulnerabilities
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
computer network security
Scalability
network security
Resiliency
Human behavior
pubcrawl
SQL injection
SQL
network security protection
detection method
system vulnerabilities
Cross-site Scripting Attacks
automated composite scanning tool
composite detection tool
directory traversal
frequent vulnerabilities
multiple vulnerabilities
the vulnerability detection module
vulnerability detection module
Cross Site Scripting
biblio
A Survey on Vulnerability Assessment Penetration Testing for Secure Communication
Submitted by aekwall on Mon, 09/28/2020 - 11:33am
Scalability
Organizations
Resiliency
Human behavior
pubcrawl
SQL injection
Computer crime
Databases
internet
tools
cross-site scripting
Penetration Testing
program testing
software security
vulnerability assessment
Web Application Security
communication security
broken authentication
Cross-site scripting (XSS)
cyber threat
Internet application
security hacking activities
security loopholes
Security Misconfiguration
security patches
Vulnerability Assessment and Penetration Testing (VAPT)
Cross Site Scripting
biblio
Data Security in cloud computing using Hierarchical CP-ABE scheme with scalability and flexibility
Submitted by grigby1 on Fri, 07/24/2020 - 11:49am
Attribute key
authorisation
authorization
authorization mechanisms
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
CipherText Policy Attribute Based Encryption
Cloud Computing
cloud service provider
collaboration
CP-ABE
Cryptography
Data Security
encryption
fine grained access control
Hierarchical CP-ABE
hierarchical CP-ABE scheme
key policy attribute based encryption
KP-ABE
Organizations
policy-based governance
pubcrawl
quality of service
Scalability
scalable access control
SQL injection
SQL injection attack
biblio
High-risk Problem of Penetration Testing of Power Grid Rainstorm Disaster Artificial Intelligence Prediction System and Its Countermeasures
Submitted by aekwall on Mon, 06/01/2020 - 9:54am
application security
Artificial Intelligence
artificial storm prediction system
Companies
composability
disaster prediction information systems
disasters
electric power information system security defense work
electrical safety
energy Internet disaster safety
energy internet disaster security
host security
information security
Information systems
internet
Internet of Things
middleware
middleware security
network security
password
Penetration Testing
PGRDAIPS
policy-based governance
power engineering computing
power grid rainstorm disaster artificial intelligence prediction system
power grid storm disasters
power grids
power Internet of Things
power meteorological service technology support
power system security
power transformer testing
program debugging
pubcrawl
resilience
Resiliency
security of data
SQL
SQL blind bug
SQL injection
SQL injection attack behavior
SQL injection penetration test
Storms
system penetration testing
Vulnerability
biblio
Impact of SQL Injection in Database Security
Submitted by aekwall on Mon, 04/20/2020 - 9:44am
authorisation
encryption
advanced encryption standard
Resiliency
Human behavior
pubcrawl
composability
Metrics
standards
SQL injection
Databases
SQL
SQL injection attack
public key cryptography
Elliptic curve cryptography
relational databases
ECC
relational database security
AES
Database Security
cracking technique
dangerous hacking technique
database information
Elliptical Curve Cryptography
hybrid encryption
world web applications
biblio
DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development
Submitted by grigby1 on Mon, 02/10/2020 - 10:36am
android
Android Development Studio
composability
computer science education
Conferences
DroidPatrol
Handheld computers
Human behavior
Human Factors
leak detection
Mobile Applications
mobile computing
mobile software development
password
program diagnostics
pubcrawl
resilience
Resiliency
Secure Software Development
security of data
Software
software engineering
SQL injection
static analysis
static analysis plugin
static analysis-based security analysis approach
static code analysis
Tainted data flow
biblio
A Machine Learning Based Approach to Identify SQL Injection Vulnerabilities
Submitted by grigby1 on Mon, 02/10/2020 - 10:27am
collaboration
deep learning
Human behavior
Metrics
policy-based governance
prediction model
privacy
pubcrawl
resilience
Resiliency
SQL detection
SQL injection
Vulnerability
biblio
Automated Combinatorial Testing for Detecting SQL Vulnerabilities in Web Applications
Submitted by grigby1 on Mon, 02/10/2020 - 10:27am
attack grammars
automated combinatorial testing
automated SQL injection vulnerability testing
collaboration
combinatorial testing
combinatorial testing methodology
concrete attack vectors
Databases
Grammar
gray-box testing
gray-box testing method
Human behavior
internet
Metrics
policy-based governance
privacy
program testing
pubcrawl
resilience
Resiliency
security of data
security testing
SQL
SQL database backend
SQL detection
SQL injection
SQL injection vulnerabilities
SQL vulnerabilities detection
Syntactics
tools
web applications
biblio
Automatic Whitelist Generation for SQL Queries Using Web Application Tests
Submitted by grigby1 on Mon, 02/10/2020 - 10:26am
application-specific implementations
automated generation
Automatic testing
automatic whitelist generation
blacklisting
collaboration
composability
confidential information
Database Security
Databases
development process
Human behavior
internet
large-scale Web applications
legitimate queries
Metrics
policy-based governance
privacy
pubcrawl
query detection
query patterns
query processing
Registers
relational databases
relational database security
research and development
resilience
Resiliency
security of data
severe vulnerability issue
SQL
SQL detection
SQL injection
SQL queries
Web application test
Web application tests
Whitelist
Whitelists
1
2
3
4
5
6
next ›
last »