Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Grippers
biblio
Automatically Generating Malware Summary Using Semantic Behavior Graphs (SBGs)
Submitted by grigby1 on Tue, 09/21/2021 - 2:51pm
Malware Analysis
Semantics
semantic behavior graph
Resiliency
resilience
pubcrawl
privacy
microsoft windows
Metrics
malware summary
behavior association
malware
Human behavior
Heuristic algorithms
Grippers
graph theory
feature extraction
Data mining
behavior description
biblio
Botnet Defense System and Its Basic Strategy Against Malicious Botnet
Submitted by grigby1 on Tue, 03/09/2021 - 1:22pm
malicious botnet detection
white-hat worms
white-hat botnets
software agents
Servers
sensors
Resiliency
resilience
pubcrawl
Petri nets
Monitoring
Metrics
agent oriented Petri nets
IoT systems
invasive software
Internet of Things
Grippers
cybersecurity system
composability
botnets
botnet defense system
botnet
Analytical models
biblio
White-Hat Worm Launcher Based on Deep Learning in Botnet Defense System
Submitted by grigby1 on Tue, 03/09/2021 - 1:21pm
IoT system
worms placement
white-hat worm launcher
white-hat botnets
Training data
Resiliency
resilience
pubcrawl
Metrics
Mathematical model
malware
malicious botnets
learning (artificial intelligence)
BDS
IoT
invasive software
Internet of Things
Grippers
deep learning
Data models
computer network security
computer network performance evaluation
composability
botnets
botnet defense system
botnet
biblio
Analysis of the Asymmetrical Relationships between State Actors and APT Threat Groups
Submitted by aekwall on Mon, 01/11/2021 - 12:38pm
Guidelines
International Affairs
Focusing
Entertainment industry
cyber deterrence
Contestability
ATT&ck
Grippers
Deterrence
Scalability
information and communication technology
attribution
Computer hacking
pubcrawl
Human behavior
Resiliency
malware
biblio
Internet of Things: An Analysis and Proposal of White Worm Technology
Submitted by grigby1 on Fri, 08/28/2020 - 10:51am
invasive software
white worm technology
security
Scalability
Resiliency
resilience
pubcrawl
Metrics
malware
IoT devices
attack surface
Internet of Things devices
Internet of Things
infiltrating malware
hackers
Grippers
Government
computer network security
Companies
biblio
MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware
Submitted by grigby1 on Fri, 08/14/2020 - 10:44am
orthogonal defense
global malware operations
law enforcement agencies
MALPITY
malware authors
malware families
malware spreading
malware tarpits
monetization techniques
command and control systems
POSIX
Sinkholing
Socket API
Tarpit
tarpit vulnerabilities
Unix
Winsock socket APIs
application programming interface
Dynamic Malware Analysis
Servers
pubcrawl
resilience
Resiliency
malware
invasive software
APIs
application program interfaces
Engines
Compositionality
network service
network operation
botnet
sockets
Grippers
botnet infrastructures
botnets
biblio
Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model
Submitted by grigby1 on Fri, 08/07/2020 - 2:38pm
resilience
insider threat
invasive software
malware
Mathematical model
Metrics
modified SEIQV model
Patching
pubcrawl
Immune system
Resiliency
SEIQP model
SEIQV
susceptible-exposed-infected-quarantined-patched model
susceptible-exposed-infected-quarantined-vaccinated model
Worm
worm propagation modeling
computer network security
air-gapped network
anti-virus
Atmospheric modeling
Biological system modeling
biologically based epidemic models
Communication networks
composability
Computational modeling
Air gaps
computer networks
Computer worms
differential equations
Epidemic model
Grippers
Human behavior
Human Factors
biblio
Model for Study of Malware Propagation Dynamics in Wireless Sensor Network
Submitted by aekwall on Mon, 02/17/2020 - 1:35pm
Wireless Sensor Network
Susceptible-Exposed-Infectious-Recovered-Dead model
Propagation
neighboring sensor nodes
malware status
malware spread
malware propagation dynamics
malicious signals presence
Grippers
Equilibrium points
epidemiology basic reproduction number
Epidemic model
early detection method
critical security challenges
computer viruses
WSN
telecommunication security
security mechanism
Stability analysis
sensor security
detection
Analytical models
Metrics
Computational modeling
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
invasive software
malware
biblio
Simulating Worm Propagation in Interconnected Peer-to-Peer Networks
Submitted by grigby1 on Tue, 11/26/2019 - 2:38pm
Peer-to-peer computing
worm propagation
unprotected network
Synapses
simulation
Servers
security
Scalability
Safety
Resiliency
resilience
pubcrawl
protected network
peer-to-peer network
attacking networks
peer to peer security
Peer to Peer
Metrics
Mathematical model
interconnected networks
Human Factors
human factor
Human behavior
Grippers
fault tolerance
competitive networks
Communication Systems
biblio
Node energy based virus propagation model for bluetooth
Submitted by grigby1 on Thu, 08/23/2018 - 10:35am
mobile computing
Viruses (medical)
Virus Propagation
smart-phone Era
smart phones
security measures
Resiliency
resilience
pubcrawl
optimal control
Node energy based virus propagation model
Node Energy Based Virus Propagation
node capacity
network traffic
NBV model works
composability
Mobile communication
mobile based Wireless technologies
human factor
Human behavior
Grippers
Electronic mail
E-mail worm Propagation model
computer viruses
computer network security
Computational modeling
Bluetooth
Bluetooth network
bluetooth security
1
2
next ›
last »