Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
policy-based-governance
biblio
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP
Submitted by
aekwall
on Mon, 02/25/2019 - 10:39am
Computer crime
Computer hacking
content management
content management systems
Cybersecurity
data confidentiality
data integrity
Data protection
Databases
Drupal website pages
Human behavior
internet
Joomla website pages
LAMP server
Metrics
Nikto
Penetration Testing
policy-based-governance
privacy
program testing
pubcrawl
Resiliency
security vulnerability
SQL
SQL injection
SQLI
SQLi vulnerabilities
SQLMAP
tools
Vulnerability
Vulnerability Analysis
vulnerability scanner
Web application
web applications
Web sites
websites
WordPress
biblio
A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning
Submitted by
aekwall
on Mon, 02/25/2019 - 10:39am
actual website
Acunetix
Computer hacking
computer science education
Crawlers
Databases
enhanced cybersecurity learning
executing SQL queries
foundational cybersecurity course
Human behavior
invasive software
Linux
Metrics
open source tools
policy-based-governance
preventive measures
privacy
pubcrawl
query processing
real-world implementation
Resiliency
retrieving sensitive information
Servers
specific website
SQL
SQL injection
SQL injection attack
threats
tools
vulnerabilities
Web sites
website connected database
biblio
Detection of SQL injection attacks by removing the parameter values of SQL query
Submitted by
aekwall
on Mon, 02/25/2019 - 10:39am
backend database
Computer crime
Conferences
confidential information
database
Databases
desktop web application
Human behavior
internet
Internet users
Metrics
mobile computing
mobile web applications
parameter values
policy-based-governance
privacy
pubcrawl
query processing
Resiliency
Runtime
SQL
SQL injection
SQL injection attack detection method
SQL injection attackers
SQL Injection attacks
SQL query
Structured Query Language
tools
web applications
web services
biblio
Real-time ETL in Striim
Submitted by
aekwall
on Mon, 02/25/2019 - 10:39am
Resiliency
Human behavior
pubcrawl
privacy
Metrics
SQL injection
data validation
ETL
real-time
policy-based-governance
biblio
Efficient Astronomical Query Processing Using Spark
Submitted by
aekwall
on Mon, 02/25/2019 - 10:39am
Resiliency
Human behavior
pubcrawl
privacy
Metrics
SQL injection
astronomical survey data management
Big Data
query processing
spark framework
policy-based-governance
biblio
WOVSQLI: Detection of SQL Injection Behaviors Using Word Vector and LSTM
Submitted by
aekwall
on Mon, 02/25/2019 - 10:39am
threat vectors
Human behavior
LSTM networks
Metrics
policy-based-governance
privacy
pubcrawl
Resiliency
SQL injection
SQL injection detection
SQL token word vector
biblio
SQL Injection Attack Principles and Preventive Techniques for PHP Site
Submitted by
aekwall
on Mon, 02/25/2019 - 10:38am
Resiliency
Human behavior
pubcrawl
privacy
Metrics
injection detection
PHP injection
PHP injection prevention
PHP site
SQL injection
SQL injection prevention
policy-based-governance