Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Grippers
biblio
Profile hidden Markov model for malware classification \#x2014; usage of system call sequence for malware classification
Submitted by grigby1 on Wed, 06/20/2018 - 11:55am
obfuscation
Trojan horses
tools
system call sequence
system call
Resiliency
resilience
pubcrawl
proteins
protein sequences
profile hidden markov model
privacy
pattern classification
obfuscation technique
bioinformatics
microsoft windows
Metrics
malware technology
malware files
malware classification
malware
invasive software
Human behavior
Hidden Markov models
Grippers
DNA sequences
DNA
biological informatics
biblio
GIS mapping and spatial analysis of cybersecurity attacks on a florida university
Submitted by grigby1 on Tue, 03/07/2017 - 12:40pm
geographic Internet protocol software
visualization
US universities
University of North Florida
statistical models
statistical analysis
spatial statistics
spatial point pattern analysis
Spatial analysis
Software
security of data
R software
pubcrawl170109
point pattern analysis
Grippers
GIS mapping
advanced spatial statistical analysis functions
geographic information systems
Geographic Information System (GIS)
GEO-IP software
exploratory spatial data analysis
Educational institutions
educational administrative data processing
Data visualization
data visualisation
data analysis
cybersecurity threat detection software
cybersecurity attacks
Cybersecurity
cyberattack
cyber-attack detection
Computer crime
biblio
"Towards a science of anomaly detection system evasion"
Submitted by abfox on Tue, 02/14/2017 - 1:27pm
advanced persistent threat
anomaly detection system evasion
computer network security
Detectors
Entropy
estimation
evade detection
Grippers
Intrusion Detection
intrusion detection system
key based randomization scheme
launch evasion attack
parameter estimation
parameter estimation attacks
pubcrawl170101
biblio
A Survey on Zero-Day Polymorphic Worm Detection Techniques
Submitted by BrandonB on Wed, 05/06/2015 - 1:58pm
payload encryption
zero-day polymorphic worm detection techniques
zero-day malware
Zero-day attacks
Vectors
signature-based defenses
Signature Generation
security layers
Polymorphic worms
Payloads
detection systems
Monitoring
malware
key per infection
invasive software
Internet security
internet
Grippers
Fingerprinting
biblio
A Decision Procedure for Deadlock-Free Routing in Wormhole Networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:54pm
Linear programming
wormhole switching technique
wormhole networks
torus topologies
Topology
telecommunication network topology
telecommunication network routing
System recovery
Switches
sufficient condition
Routing protocols
routing functions
Routing
network topology
necessary condition
adaptive routing function
integer programming
Grippers
formal methods
Design methodology
decision procedure
deadlocks
deadlock-free routing
deadlock freedom
computer networks
computational complexity
Communication networks
communication network design
co-NP-complete problem
automatic verification
biblio
Fingerprinting Internet DNS Amplification DDoS Activities
Submitted by BrandonB on Wed, 05/06/2015 - 9:40am
geolocation
storage capacity 720 Gbit
sensors
packet size
network-layer
Monitoring
IP networks
Internet-scale DNS amplification DDoS attacks
internet
Grippers
anti-spam organizations
fingerprinting Internet DNS amplification DDoS activities
distributed denial of service
detection period
darknet space
cyber security intelligence
computer network security
Computer crime
backscattered analysis
attack duration
biblio
Slow-Paced Persistent Network Attacks Analysis and Detection Using Spectrum Analysis
Submitted by BrandonB on Fri, 05/01/2015 - 7:37am
Discrete Fourier transforms
Grippers
network security
persistent activity
slow-paced attack
Spectral analysis
spectrum analysis
time series
Time series analysis
time-domain analysis
Time-frequency Analysis
biblio
Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks
Submitted by BrandonB on Fri, 05/01/2015 - 6:59am
malware propagation model
WSN
wireless sensor networks
traditional epidemic theory
telecommunication security
telecommunication control
sleep mode
Silicon
sensor node characteristics
saddle-point
overall cost minimization
optimal dynamic strategy
optimal control problem
malware-defense differential game
malware propagation prevention
bang-bang control
Malware propagation
malware
invasive software
Grippers
Games
epidemic theory
Differential Games
differential game-based strategy
Differential game
differential equations
decision-making problem
control systems
bang-bang controls
biblio
Fingerprinting Internet DNS Amplification DDoS Activities
Submitted by BrandonB on Thu, 04/30/2015 - 12:19pm
geolocation
storage capacity 720 Gbit
sensors
packet size
network-layer
Monitoring
IP networks
Internet-scale DNS amplification DDoS attacks
internet
Grippers
anti-spam organizations
fingerprinting Internet DNS amplification DDoS activities
distributed denial of service
detection period
darknet space
cyber security intelligence
computer network security
Computer crime
backscattered analysis
attack duration
« first
‹ previous
1
2