Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Zero day attacks
biblio
Spatio-temporal Context Reduction: A Pointer-analysis-based Static Approach for Detecting Use-after-free Vulnerabilities
Submitted by grigby1 on Mon, 12/10/2018 - 11:39am
bug detection
composability
defense
Metrics
program analysis
pubcrawl
resilience
Resiliency
use-after-free
Zero day attacks
biblio
Multi-source Data Analysis and Evaluation of Machine Learning Techniques for SQL Injection Detection
Submitted by grigby1 on Mon, 12/10/2018 - 11:39am
composability
defense
machine learning
Metrics
network intrusion detection
pubcrawl
resilience
Resiliency
SQL injection
Zero day attacks
biblio
Cracking IoT Device User Account via Brute-force Attack to SMS Authentication Code
Submitted by grigby1 on Mon, 12/10/2018 - 11:39am
Brute-force Attack
composability
defense
IoT device
Metrics
pubcrawl
resilience
Resiliency
Router Systems Security
SMS authentication code
user account
Zero day attacks
biblio
Integrated Instruction Set Randomization and Control Reconfiguration for Securing Cyber-physical Systems
Submitted by grigby1 on Mon, 12/10/2018 - 11:38am
composability
cyber-physical systems
defense
Instruction Set Randomization
Metrics
moving target defenses
Predictive Metrics
pubcrawl
resilience
Resiliency
Resilient Architectures
Scalability
Zero day attacks
biblio
A Machine Learning Approach to Malicious JavaScript Detection using Fixed Length Vector Representation
Submitted by grigby1 on Mon, 12/10/2018 - 11:38am
pubcrawl
malicious JavaScript detection
malicious JS code detection
malicious JS codes
Metrics
neural nets
neural network model
Neural networks
pattern classification
plugin software
Predictive models
machine learning
resilience
Resiliency
Support vector machines
Vectors
web applications
Web site
Web sites
Zero day attacks
Zero-day attacks
drive-by-download attacks
Browsers
classifier model
composability
Context modeling
cyberattacks
Cybersecurity
D3M Dataset
defense
Doc2Vec
Doc2Vec features
authoring languages
Drive-by-Download Data
feature extraction
feature learning
features extraction
fixed length vector representation
invasive software
Java
JavaScript
learning (artificial intelligence)
biblio
An Adaptive Real-Time Architecture for Zero-Day Threat Detection
Submitted by grigby1 on Mon, 12/10/2018 - 11:38am
online trained supervised classification schemes
zero-day threats learning
zero-day threat detection
Zero-day attacks
Zero day attacks
Training
Support vector machines
stream processing technology
security systems
security of data
security
Resiliency
resilience
real-time systems
pubcrawl
online trained unsupervised anomaly detection schemes
Adaptation models
network operator
Metrics
legitimate user behavior
learning (artificial intelligence)
honeypots
Distributed databases
detection models training
defense
composability
attacker behavior
Anomaly Detection
adaptive threat detection architecture
adaptive real-time architecture
adaptive detection schemes
biblio
A Zero-Day Resistant Malware Detection Method for Securing Cloud Using SVM and Sandboxing Techniques
Submitted by grigby1 on Mon, 12/10/2018 - 11:38am
OS images
zero-day resistant malware detection method
Zero-day resistance
Zero-day attacks
Zero day attacks
user machine
tools
SVM
Support vector machines
security of data
sandboxing techniques
Resiliency
resilience
pubcrawl
phase exhaustive technique
Cloud Computing
operating systems (computers)
networking schemes
n-class SVM
Metrics
malware
machine learning
IT infrastructure
feature extraction
defense
Conferences
computer security
composability
clouds
biblio
Network Anomaly Detection with Stochastically Improved Autoencoder Based Models
Submitted by grigby1 on Thu, 06/07/2018 - 3:09pm
pubcrawl
Zero day attacks
two deep learning
Training
stochastically improved autoencoder
Stochastic processes
Stochastic Computing Security
Stochastic computing
stochastic approach
singular anomaly detection methods
security of data
security
Scalability
Resiliency
resilience
Anomaly Detection
noise reduction
network security
network anomaly detection
learning (artificial intelligence)
KDDTest+ dataset
Intrusion Detection Systems
Intrusion Detection
denoising autoencoder
deep learning
Data models
Computational modeling
autoencoder
anomaly detection models
biblio
Zero-Day Attack Identification in Streaming Data Using Semantics and Spark
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
semantic reasoning
MRMR feature selection algorithm
parallel detection
pattern classification
pubcrawl
Resiliency
security of data
semantic learning
Semantic learning and reasoning
semantic link networks
minimum redundancy maximum relevance feature selection algorithm
Semantics
SLN
Spark Streaming
Spark streaming platform
Sparks
Training
Zero day attacks
zero-day attack identification
feature extraction
cognition
collaborative classification methods
Collaborative mining
composability
Computer hacking
Data Streaming
defense
dynamic semantic graph generation
Anomaly Detection
Feature Selection
Flow Creation
graph theory
groupware
IDS
Intrusion Detection Systems
learning (artificial intelligence)
Metrics
biblio
Countermeasureing Zero Day Attacks: Asset-Based Approach
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
Predictive Metrics
zero-day attack detection
Zero Day Attacks and Defense
zero day attack countermeasureing
system calls
security of data
security models
security life cycle
security domain
security
Resiliency
pubcrawl
Zero day attacks
operating systems
Monitoring
Metrics
malware
Games
defense mechanisms
Databases
composability
Companies
asset-based approach
defense
« first
‹ previous
1
2
3
4
5
next ›
last »