Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
unsolicited e-mail
biblio
Investigation Malware Analysis Depend on Reverse Engineering Using IDAPro
Submitted by grigby1 on Wed, 09/20/2023 - 9:50am
pubcrawl
unsolicited e-mail
Trojan malware analysis
static analysis
source coding
social networking (online)
reverse engineering
Resiliency
resilience
disassembler
privacy
Metrics
Malware Analysis
malware
IDAPro
Human behavior
feature extraction
biblio
Performance evaluation of Spam and Non-Spam E-mail detection using Machine Learning algorithms
Submitted by grigby1 on Fri, 02/17/2023 - 4:39pm
support vector machine classification
Costs
support vector machine (SVM)
social networking (online)
unsolicited e-mail
renewable energy sources
programming
Scalability
Metrics
Human behavior
pubcrawl
machine learning algorithms
Naïve Bayesian classification
k-nearest neighbor algorithm
and neural networks
spam detection
biblio
Finding Collusive Spam in Community Question Answering Platforms: A Pattern and Burstiness Based Method
Submitted by grigby1 on Fri, 02/17/2023 - 4:38pm
Vocabulary
machine learning
pubcrawl
Human behavior
Metrics
Scalability
Big Data
unsolicited e-mail
Knowledge engineering
Q&A Spam Detection
crowdsourcing
Web and internet services
spam detection
Burstiness Detecting
Collusive Spamming Activities
community question answering
Frequent Pattern
biblio
Research on Filtering Feature Selection Methods for E-Mail Spam Detection by Applying K-NN Classifier
Submitted by grigby1 on Fri, 02/17/2023 - 4:38pm
spam detection
text categorization
human computer interaction
Euclidean distance
Feature Selection
unsolicited e-mail
Scalability
Filtering
robots
Metrics
Human behavior
pubcrawl
feature extraction
K-NN classifier
biblio
A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy Zone
Submitted by grigby1 on Thu, 10/13/2022 - 11:16am
security
Monitoring
Servers
pubcrawl
Human behavior
DNS
Phishing
unsolicited e-mail
Electronic mail
Uniform resource locators
overload mitigation
phishing URL
Response Policy Zone
route detouring
RPZ
URL Phishing attack
biblio
No Phishing With the Wrong Bait: Reducing the Phishing Risk by Address Separation
Submitted by grigby1 on Thu, 10/13/2022 - 11:15am
security
pubcrawl
Human behavior
Registers
taxonomy
Phishing
unsolicited e-mail
Electronic mail
usability
biblio
Cyber Threat Detection Using Machine Learning Techniques: A Performance Evaluation Perspective
Submitted by aekwall on Mon, 11/08/2021 - 2:22pm
cyber threat
Measurement
threat vectors
unsolicited e-mail
spam classification
performance evaluation
Machine Learning Application
Cyberspace
Cybercrime
Support vector machines
intrusion detection system
Decision trees
malware detection
malware
machine learning
privacy
pubcrawl
Computer crime
biblio
APTrace: A Responsive System for Agile Enterprise Level Causality Analysis
Submitted by aekwall on Tue, 04/27/2021 - 12:35pm
network security
Scalability
malware
Resiliency
pubcrawl
Phishing
Security Heuristics
predictability
unsolicited e-mail
Backtracking
Backtracking analysis
domain language
Domain Specific Languages
expressiveness
responsiveness
biblio
A Two-stage P2P Botnet Detection Method Based on Statistical Features
Submitted by grigby1 on Tue, 03/09/2021 - 1:25pm
Payloads
unsolicited e-mail
two-stage P2P botnet detection method
traffic statistical features
telecommunication traffic
statistical feature
statistical analysis
software engineering
Resiliency
resilience
real-time systems
pubcrawl
Peer-to-peer computing
benign P2P hosts
p2p
network security
Monitoring
Metrics
machine learning
invasive software
feature extraction
detection
computer network security
composability
botnets
botnet
biblio
Reliability Analysis of Concurrent Data based on Botnet Modeling
Submitted by grigby1 on Tue, 03/09/2021 - 1:23pm
network modelling
unsolicited e-mail
time series
telecommunication traffic
spam
security risks
security of data
Resiliency
resilience
reliability analysis
Reliability
pubcrawl
pattern clustering
network traffic time series
botnet modeling
multidimensional permutation entropy
Metrics
invasive software
high-privilege systems
Entropy
detection methods
data complex structure analysis
concurrent data
computer network security
composability
clustering variance method
botnets
1
2
3
4
5
6
next ›
last »