Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Kernel
biblio
[Research Paper] Combining Obfuscation and Optimizations in the Real World
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
Code Obfuscation
white box cryptography
white-box encryption calls
tool-specific countermeasures
sequential pass management techniques
scheduling code transformations
rewriting systems
reverse engineer
pass scheduling problem
pass ordering
pass combinations
multicriteria optimization problem
Job shop scheduling
industrial-strength obfuscator
code tangling techniques
code obfuscator
Cryptography
program compilers
reverse engineering
Virtualization
scheduling
obfuscation
Heuristic algorithms
optimisation
tools
optimization
Metrics
composability
pubcrawl
Resiliency
Kernel
biblio
A Protocol Independent Approach in Network Covert Channel Detection
Submitted by grigby1 on Thu, 07/16/2020 - 12:18pm
supervised learning
network traffic dataset
protocol independent approach
protocol-independent approach
Protocols
pubcrawl
resilience
Resiliency
Scalability
stealth tunnels
network storage covert channel detection
supervised machine learning technique
support vector machine (SVM)
Support vector machines
TCP
TCP protocols
telecommunication computing
telecommunication traffic
wireless channels
IP networks
Compositionality
covert channel communication
covert channels
Decision Tree
DNS
DNS protocols
feature extraction
generic detection model
composability
IP protocols
IPv4
k-nearest neighbors
Kernel
logistic regression
Logistics
machine learning
network covert channel
biblio
An Online System Dependency Graph Anomaly Detection based on Extended Weisfeiler-Lehman Kernel
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
Compositionality
Cyber Dependencies
Weisfeiler-Lehman graph kernel
System dependency graph
streamspot
simHash
online system dependency graph anomaly detection
multitasking systems
multiprogramming
modern operating systems
locality-sensitive hashing
graph similarity
extended Weisfeiler-Lehman kernel
embedding and clustering of heterogeneous graphs
dependency graph
clustering analysis
Intrusion Detection
Human Factors
pattern clustering
Forensics
Anomaly Detection
Clustering algorithms
standards
Metrics
graph theory
pubcrawl
Resiliency
Kernel
Task Analysis
Scalability
security of data
biblio
Towards a Generic Approach for Memory Forensics
Submitted by grigby1 on Wed, 06/03/2020 - 12:02pm
Kernel
Scalability
Resiliency
resilience
Random access memory
pubcrawl
PDB file
microsoft windows
Metrics
Memory Forensics
Application's data
information forensics
Human Factors
Human behavior
Forensics
digital evidence
Debugging information
debugging
data structures
Data mining
biblio
Deep Embedding Logistic Regression
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
Predictive models
nonlinear dimension-wise feature embedding
narrow neural network
LR
interpretability
DNNs
DELR
deep embedding logistic regression
classification accuracy
actionability
network accountability
accountability
deep neural networks
Numerical models
Kernel
regression analysis
Mathematical model
Logistics
pattern classification
Neural networks
neural nets
Metrics
classification
composability
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
biblio
An Improved Convolutional Neural Network Model for Intrusion Detection in Networks
Submitted by aekwall on Mon, 05/11/2020 - 11:18am
Kernel
traditional machine learning technology
Support vector machines
security of data
Resiliency
pubcrawl
popular detection technology
pattern classification
network security
network intrusion detection model
network intrusion detection
Metrics
machine learning
low detection rate
learning (artificial intelligence)
Artificial Neural Networks
KDD99 datasets
intrusion samples
Intrusion Detection
improved convolutional neural network model
feature extraction
cyber security
convolutional neural networks
convolutional neural network algorithm
convolutional neural nets
convolution
composability
CNN
policy-based governance
cyber physical systems
biblio
LuNet: A Deep Neural Network for Network Intrusion Detection
Submitted by grigby1 on Fri, 05/08/2020 - 2:43pm
recurrent neural nets
Metrics
network attack
network intrusion detection
network intrusion detection techniques
network traffic data
network traffic datasets
network users
Neural Network Security
policy-based governance
pubcrawl
machine learning
recurrent neural network
Recurrent neural networks
Resiliency
security issue
signature-based approach
spatial features
telecommunication traffic
temporal features
Training
feature extraction
AI-based solutions
Artificial Neural Networks
collaboration
computer network security
convolutional neural nets
convolutional neural network
cyber physical systems
Deep Neural Network
detection capability
advanced network attacks
hierarchical CNN+RNN neural network
input traffic data learning
intelligent capability
Intrusion Detection
intrusion detection system
Kernel
large scale network
learning (artificial intelligence)
LuNet
biblio
Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection
Submitted by aekwall on Mon, 05/04/2020 - 11:15am
deep learning
networked system
network security practices
network attack detection technology
network attack detection tasks
network attack detection
Graph Kernel
flow-based network attack detection
deep learning architecture
anomaly-based approaches
Network Security Architecture
deep neural networks
Computer crime
network traffic
convolutional neural nets
Neural networks
graph theory
pubcrawl
Resiliency
learning (artificial intelligence)
computer architecture
Kernel
IP networks
computer network security
biblio
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning
Submitted by grigby1 on Fri, 04/17/2020 - 11:28am
system monitoring
OS kernel
OS resource management
pubcrawl
Registers
resilience
Resiliency
rootkit
run-time features
security of data
OS
target kernel module
TF-IDF method
user-mode rootkit detection
Virtual machine monitors
virtual machines
virtualisation
Virtualization
windows kernel rootkits
Windows Operating System Security
kernel space
feature extraction
Hardware
hardware assisted virtualization technology
invasive software
Kernel
kernel rootkit
kernel rootkit detection approach
kernel rootkit detection solution
kernel rootkit detection system
composability
learning (artificial intelligence)
machine learning
machine learning techniques
malicious kernel module
Metrics
operating system
operating system kernels
operating systems (computers)
biblio
Undertow: An Intra-Kernel Isolation Mechanism for Hardware-Assisted Virtual Machines
Submitted by grigby1 on Fri, 04/17/2020 - 10:24am
isolation
bug-prone
commodity operating system
critical data
EPT violations
flexible cloud servers
guest kernel
guest virtual machine
Hardware virtualization
hardware-assisted isolation mechanism
hardware-assisted virtual machines
Intel processors
intra-kernel isolation mechanism
isolated environment
boot time
Kernel Protection
multiple restricted Extended Page Table
nested kernel
popular paths
pre-defined EPT
read-only protection
system calls
unpopular paths
untrusted code
untrusted outter kernel
virtualization exception
VMFUNC
virtualization privacy
composability
Cloud Computing
security
Trusted Computing
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
sensitive data
privacy
storage management
security threats
authorisation
invasive software
Linux
Switches
virtualisation
Virtual machining
Kernel
operating system kernels
Virtual machine monitors
virtual machines
Virtualization
Metrics
security policies
bare-metal machines
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »