Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
statistical analysis
biblio
Empowering convolutional networks for malware classification and analysis
Submitted by grigby1 on Tue, 01/23/2018 - 3:53pm
pattern classification
malware
Malware Analysis
malware analytics
malware classification
malware families
metadata
Metrics
Neural networks
malicious executable detection
PE files
portable executable files
privacy
pubcrawl
Resiliency
statistical analysis
statistical machine learning
Feedforward neural networks
convolutional networks
convolutional neural constructs
Data mining
disassembled malicious binary execution sequences
feature extraction
feature plain vectorization
feedforward neural constructs
feedforward neural nets
Convolutional codes
hierarchical feature extraction
Human behavior
information feature extraction
instruction n-grams convolution
invasive software
learning (artificial intelligence)
malicious executable classification
biblio
Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts
Submitted by grigby1 on Tue, 01/16/2018 - 6:34pm
malware sandboxes
wear-and-tear artifacts
Virtualization
Virtual machining
tools
statistical models
statistical analysis
spotless sandboxes
security
Scalability
sandbox evasion techniques
sandbox
Resiliency
pubcrawl
Metrics
Bare-metal Host
malware analysis systems
Malware Analysis
malware
invasive software
Instruments
Human Factors
evasion
Environment Aware Malware
dynamic analysis
Decision trees
data analysis
Companies
BIOS Security
biblio
Machine Learning Based DDoS Attack Detection from Source Side in Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:24pm
machine learning based DDoS attack detection
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
telecommunication computing
statistical information
statistical analysis
Servers
Resiliency
pubcrawl
network traffic
network security
network packages
Metrics
Cloud Computing
machine learning algorithms
machine learning
learning (artificial intelligence)
Human behavior
feature extraction
Denial of Service attacks
DDoS attack detection
DDoS Attack
computer network security
Computer crime
composability
cloud server hypervisor
cloud provider
biblio
Process Metrics Are Not Bad Predictors of Fault Proneness
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
Niobium
Trusted Computing
trust-worthy predictions
statistical analysis
static code metrics
software quality
software metrics
pubcrawl
process metrics
predictive security metrics
Predictive models
Predictive Metrics
prediction
pattern classification
Bayes methods
Naive Bayes
Metrics
Inspection
faulty modules
faulty classes
faults
fault/defect prediction models
fault proneness
fault prediction performance evaluation
Couplings
classifier
box plot visual inspection
biblio
Mixed chaotic maps based encryption for high crypto secrecy
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
Logistics
Transposition
Substitution
statistical analysis
standards
simple chaotic maps
secure image encryption techniques
secure image encryption
Resiliency
pubcrawl
mixed chaotic maps
Metrics
chaos
initial conditions
Image Processing
high crypto secrecy
encryption
Elliptic curve cryptography
Cryptography
cryptographic algorithms
composability
chaotic cryptography
chaotic communication
chaos based image encryption technique
biblio
IoT based ransomware growth rate evaluation and detection using command and control blacklisting
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
Servers
network security
physical devices
pubcrawl
Ransomware
ransomware attacks statistics
ransomware growth rate detection
Resiliency
Scalability
Metrics
statistical analysis
TCP/IP header extraction
TCP/IP traffic
telecommunication traffic
threatening ransomware attacks
transport protocols
Web proxy server
command and control blacklisting
malware
locky ransomware
IP networks
IoT environment
invasive software
internetworking
Internet of Things
internet
encryption
emerging ransomware families
Elliptic curve cryptography
detection using command
cyber-attack threat
Cryptowall ransomware attack detection model
computer network security
biblio
Detecting mobile botnets through machine learning and system calls analysis
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
malware
threat minimization
system call analysis
statistical feature extraction
statistical analysis
self-generated dataset
Resiliency
pubcrawl
pattern detection
Monitoring
Mobile handsets
mobile environment
mobile computing
Mobile communication
mobile botnet detection
Metrics
anomalous behavior identification
machine learning algorithms
machine learning
legitimate application
learning (artificial intelligence)
invasive software
Internet security
internet
host-based approach
feature extraction
desktop domain
computer network security
Compositionality
close-to-reality scenario
botnets
anomaly-based approach
biblio
Anomaly Detection Using Persistent Homology
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Metrics
vulnerability detection
tools
Three-dimensional displays
summary statistics
statistical analysis
set theory
security of data
Resiliency
pubcrawl
Ports (Computers)
persistent homology
Anomaly Detection
IP networks
Indexes
Human Factors
Human behavior
dynamic point cloud
detection algorithms
Cybersecurity
cyber network
Compositionality
anomaly detection algorithm
biblio
Investigating the {Discriminative} {Power} of {Keystroke} {Sound}
Submitted by grigby1 on Wed, 03/08/2017 - 2:46pm
keystroke dynamics
virtual letters
virtual alphabet learning
user recognition
Training
text analysis
statistical features
statistical analysis
static text-based authentications
sound streams
score matching
pubcrawl170115
Presses
keystroke sound segments
Keystroke sound
keystroke dynamics modeling
Acoustics
keyboard typing
Keyboards
Histograms
free text-based authentications
feature extraction
discriminative power
directed graphs
digraph latency
continuous user authentication application
Continuous Authentication
authorisation
authentication decision
authentication
Acoustic signal processing
biblio
Highly robust analysis of keystroke dynamics measurements
Submitted by grigby1 on Wed, 03/08/2017 - 2:44pm
Particle measurements
typing characteristics
statistical analysis
robust classification performance analysis
regularized linear discriminant analysis
pubcrawl170115
principal component analysis
Pollution measurement
pattern classification
Atmospheric measurements
MWCD-L2-LDA
minimum weighted covariance determinant estimator
message authentication
keystroke dynamics measurements
implicit weight assignment
Covariance matrices
authentication method
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »