Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection
Submitted by grigby1 on Wed, 10/02/2019 - 3:03pm
modeling technique
traffic characterization
telecommunication traffic
telecommunication security
RFIDs
RFID traffic patterns
RFID traffic models
RFID traces
RFID security
RFID
Resiliency
resilience
radiofrequency identification
pubcrawl
piecewise graphs
NFC
Adaptation models
modeling algorithms
Knuth's Rule
ISO standards
IoT
IEC standards
Human Factors
Human behavior
graph theory
Computational modeling
binned RFID command counts
Bayesian Blocks
Bayes methods
anomaly/intrusion detection
Anomaly Detection
biblio
Graph-Based APT Detection
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
Image edge detection
Web interface
undocumented attacks
Servers
Resiliency
pubcrawl
Protocols
privacy
Organizations
Metrics
Malware Analysis
invasive software
advanced persistent threats
Human behavior
HTTP traffic
graph-based APT detection
graph theory
graph model
detection system
Browsers
Batch production systems
Approximation algorithms
antiviruses
biblio
AppDNA: App Behavior Profiling via Graph-Based Deep Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
malicious apps
Task Analysis
Resiliency
pubcrawl
privacy
Plagiarism
pattern classification
Neural networks
mobile computing
mobile applications behaviors
Metrics
malware detection
malware classification
Malware Analysis
malware
app behavior profiling
machine learning
learning (artificial intelligence)
invasive software
Human behavior
graph-encoding method
graph-based deep learning
graph theory
function-call-graph-based app profiling
feature extraction
encoding
benign apps
AppDNA
app recommendation
biblio
DLGraph: Malware Detection Using Deep Learning and Graph Embedding
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
Metrics
Windows application programming interface calls
Windows API calls
Trojan horses
static analysis
stacked denoising autoencoders
softmax regression
SDA
Resiliency
representation learning
pubcrawl
privacy
pattern classification
noise reduction
neural nets
microsoft windows
application program interfaces
malware detection
Malware Analysis
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding
function-call graphs
function-call graph
feature extraction
embedded vector
embedded systems
DLGraph
deep learning
combined feature vector classification
biblio
Identification of Distributed Malware
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
public domain software
malware writers
Metrics
mobile computing
Mobile handsets
multiple anti-virus apps
open source platform
personal data
privacy
pubcrawl
malware prevention
Resiliency
security
Servers
simple worms
smart phones
smartphone revolution
sophisticated DDOS
static analysis
technological complexities increase
generic viruses
Android malware
Android system
attackers
botnets
computer malware
computer viruses
distributed direction
distributed malware
fully functional portable computers
android
Google
graph matching algorithm
graph theory
Human behavior
inholding multiple applications
Labeling
malware
Malware Analysis
malware detection
biblio
TINET: Learning Invariant Networks via Knowledge Transfer
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
dependency construction
enterprise security system
entity embedding
graph theory
heterogeneous categorical event
Human behavior
invariant network
knowledge transfer
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
biblio
Behavior-Based Community Detection: Application to Host Assessment In Enterprise Information Networks
Submitted by grigby1 on Mon, 06/10/2019 - 1:58pm
Anomaly Detection
behavior modeling
community detection
Comparative Analysis
enterprise information network
entity embedding
graph theory
host assessment
Human behavior
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
biblio
Obfuscation Resilient Search Through Executable Classification
Submitted by grigby1 on Mon, 06/10/2019 - 1:58pm
bytecode analysis
bytecode search
Computing Theory and Resilience
Control Theory
deep learning
executable search
graph theory
Human behavior
Malware Analysis
Metrics
obfuscation resilience
privacy
pubcrawl
Resiliency
biblio
Fast and Scalable Distributed Loopy Belief Propagation on Real-World Graphs
Submitted by grigby1 on Mon, 06/10/2019 - 1:58pm
distributed graph processing
graph theory
Human behavior
loopy belief propagation
Malware Analysis
Metrics
privacy
pubcrawl
real-world graphs
Resiliency
biblio
A Graph-Based Model for Malicious Software Detection Exploiting Domination Relations Between System-Call Groups
Submitted by grigby1 on Mon, 06/10/2019 - 1:58pm
Algorithms
Compositionality
detection
graph theory
graphs
Human behavior
malware
Malware Analysis
Predictive Metrics
privacy
pubcrawl
Resiliency
Scientific Computing Security
security
Systems
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »