Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
Approximation algorithms
tor resource distribution
tor anonymous communication system
suspicious malicious users
resource distribution process
resource distribution
minimum malicious user
Integer Linear Program
enumeration attacks
Distribution strategy
computer program
anonymous communication system
Bipartite graph
Linear programming
detection method
Bridges
computer network security
Communication Systems
integer programming
Relays
Web sites
sybil attacks
Metrics
resource management
graph theory
Sybil attack
detection
composability
pubcrawl
Resiliency
network security
biblio
Malicious URL Linkage Analysis and Common Pattern Discovery
Submitted by grigby1 on Fri, 12/11/2020 - 2:35pm
Malicious URL
website
Web pages
URL
Uniform resource locators
Resiliency
resilience
real enterprise network
pubcrawl
privacy
open-source threat intelligence
Metrics
Malware Analysis
malware
malicious URL linkage analysis
blacklisting
malicious domain names
malicious domain name
malicious destinations
linkage analysis
internet
Industries
Human behavior
graph-based model
graph theory
drive-by download
Crawlers
Couplings
computer network security
business communication
biblio
C500-CFG: A Novel Algorithm to Extract Control Flow-based Features for IoT Malware Detection
Submitted by grigby1 on Fri, 12/11/2020 - 2:34pm
Internet of Things
text-based methods
text analysis
static characteristic extraction method
Resiliency
resilience
pubcrawl
privacy
Metrics
malware detection
Malware Analysis
malicious code
IoT malware detection
IoT
invasive software
C500-CFG
Human behavior
high-complexity programs
graph theory
feature information
feature extraction
dynamic programming
Ding's NP-hard problem
decom-piled executable codes
control flow-based features
control flow graph
computer network security
computational complexity
C500-CFG algorithm
biblio
Applications of Graph Integration to Function Comparison and Malware Classification
Submitted by grigby1 on Fri, 12/11/2020 - 2:34pm
pubcrawl
NET
pagerank
PageRank measure integration vectorization
PageRank vector
pattern classification
Perron vector
PMIV
privacy
probability
probability measure
Metrics
random forests
resilience
Resiliency
set theory
standalone classifier
text analysis
text-only feature space
vanilla random forest
vertex set
hand-engineered functions
abstract syntax tree
classification
code block
decompilation
directed graphs
easy-to-compute glass-box vectorization scheme
feature extraction
function comparison
graph integration
graph theory
.NET files
Human behavior
invasive software
Lebesgue antiderivatives
machine learning
malware
Malware Analysis
malware classification
markov chain
Markov processes
biblio
Multimodal Graph Analysis of Cyber Attacks
Submitted by grigby1 on Fri, 12/11/2020 - 2:34pm
pubcrawl
Metrics
multimodal graph
multimodal graph analysis
multimodal graph approach
multimodal graph nodes
nodes classification
observed cyber events
privacy
Malware Analysis
resilience
Resiliency
security of data
single-modality graphs
strong inter-modal ties
targeted nodes
unclassified regime
cyber-attacks
attack stages
attacker
autonomous systems
Centrality
centrality analysis
community analysis
Computational modeling
Cyber Attacks
Analytical models
cyberattack
cyberattack victims
Data mining
graph theory
Human behavior
IP networks
malware
biblio
Towards Deep Federated Defenses Against Malware in Cloud Ecosystems
Submitted by grigby1 on Fri, 12/11/2020 - 2:33pm
neural nets
machine learning
machine learning models
malware
Malware Analysis
malware containment
malware detection
Malware-Detection-Cloud-Computing-Graph-Neural-Networks-Federated-Learning-Multicloud-Natural-Language-Processing
Metrics
learning (artificial intelligence)
privacy
Privacy Requirements
pubcrawl
resilience
Resiliency
Task Analysis
Training
virtual machines
feature representation
Biological system modeling
Bit error rate
Cloud Computing
cloud computing environments
cloud-specific optimization problems
data privacy
deep federated defenses
feature extraction
attentional sequence models
federated learning
graph neural networks
graph theory
Human behavior
hypergraph learning models
inductive graph
invasive software
biblio
Deep Android Malware Classification with API-Based Feature Graph
Submitted by grigby1 on Fri, 12/11/2020 - 2:33pm
invasive software
structure analysis
Silicon
security
Resiliency
resilience
pubcrawl
privacy
mobile computing
Metrics
Mathematical model
malware class
malware apps
Malware Analysis
malware
Analytical models
Human behavior
hand-refined API-based feature graph
graph theory
Feature Selection
feature extraction
deep learning
CNN-based classifier
application program interfaces
API-based feature graph classification
API features
Android malware classification
Android malware apps
Android malware
Android (operating system)
biblio
AMDroid: Android Malware Detection Using Function Call Graphs
Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
learning (artificial intelligence)
structural semantic learning
static analysis
smart phones
Semantics
Resiliency
resilience
pubcrawl
privacy
opcode sequences
mobile operating system
mobile internet
Metrics
Malware Analysis
malware
machine learning
AMDroid
Kernel
invasive software
Human behavior
graph theory
graph kernels
function call graphs
function call graph
feature extraction
FCGs
countless malicious applications
application program interfaces
API calls
Android Malware Detection
Android (operating system)
biblio
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
privacy
invasive software
IoT malware samples
learning (artificial intelligence)
malware
Malware Analysis
malware detection
Metrics
off-the-shelf adversarial attack methods
Internet of Things
pubcrawl
resilience
Resiliency
robust detection tools
security
static analysis
tools
adversarial learning
Human behavior
graph-based IoT malware detection systems
graph theory
graph embedding
graph analysis
generated adversarial sample
GEA approach
feature extraction
deep learning networks
deep learning
craft adversarial IoT software
control flow graph-based features
CFG-based features
benign sample
augmentation method
biblio
Graph Embedding Based Familial Analysis of Android Malware using Unsupervised Learning
Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
Malware Analysis
Unsupervised Learning
supervised learning
SRA
smart phones
similarity relationships
Semantics
security
Resiliency
resilience
pubcrawl
privacy
pattern clustering
pattern classification
Metrics
malware link network
analytical workload
malware
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding techniques
graph embedding
GefDroid
feature extraction
familial analysis
Face
detection algorithms
application program interfaces
Android malware
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »