Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious software
biblio
Implementation of SDN-based IDS to protect Virtualization Server against HTTP DoS attacks
Submitted by grigby1 on Fri, 04/09/2021 - 11:33am
resilience
virtualization servers
virtualization server
virtualization environments
SDN-based security applications
SDN-based IDS
intrusion attacks
HTTP DoS attacks
HTTP DoS
SDN networks
SDN technology
denial-of-service attack
network traffic analysis
IDS
network intrusion detection system
cloud
Cloud Computing
Virtualization
Virtual machining
malicious software
virtualisation
Switches
software defined networking
SDN
Denial of Service attacks
telecommunication traffic
composability
web services
computer network security
Resiliency
pubcrawl
Servers
biblio
AI-Powered Honeypots for Enhanced IoT Botnet Detection
Submitted by grigby1 on Tue, 03/09/2021 - 2:24pm
potential botnet existence
IoT network
learning (artificial intelligence)
malicious activities
malicious software
malware
malware spread
Metrics
MITM
novel hybrid Artificial Intelligence-powered honeynet
IoT
pubcrawl
resilience
Resiliency
revolutionary expandable network
security
security gaps
Servers
upcoming security mechanism
connected devices
botnet
botnets
Cloud Computing
composability
compromised devices
Computer crime
Computer hacking
computer network security
AI-powered honeypots
conventional security architectures
DDoS
denial-of-service attack
enhanced IoT botnet detection rate
hackers
honeypots
Internet of Things
invasive software
biblio
Evolutionary Computation for Improving Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:13pm
program debugging
variable-strength covering arrays
software improvement
malicious code
individual software artifacts
GI-based bug repair
GI-based approach
genetic improvement
automated repair
automated malware analysis
benign software
Genetics
evolutionary computation
malicious software
Predictive Metrics
Servers
malware samples
Malware Analysis
genetic algorithms
software maintenance
privacy
tools
Metrics
pubcrawl
Human behavior
Resiliency
invasive software
security
malware
biblio
IoT Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:12pm
machine learning
Ollydebug
IoT malware analysis
information system integrity
information system confidentiality
information system availability
CIA triad
malicious users
malicious software
Predictive Metrics
malware attacks
Malware Analysis
image recognition
privacy
IoT
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
invasive software
security
malware
data integrity
IoT devices
Internet of Things
Conferences
biblio
Insights into Malware Detection via Behavioral Frequency Analysis Using Machine Learning
Submitted by aekwall on Mon, 10/26/2020 - 12:11pm
known malware
malicious software
malicious activity
Microsoft Windows (operating systems)
machine learning models
behavioral frequency analysis
benign software
common defenses
common malware defenses
dynamic behavioral analysis
Predictive Metrics
Malware Behavioral Analysis
malware signature classifier
malware threat landscape
signature catalog
unknown malware
Windows API system function calls
zero-day
zero-day vulnerabilities
Metrics
malware detection
invasive software
machine learning algorithms
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
machine learning
malware
pattern classification
Analytical models
privacy
microsoft windows
Malware Analysis
application program interfaces
dynamic analysis
Software algorithms
biblio
If Air-Gap Attacks Encounter the Mimic Defense
Submitted by grigby1 on Fri, 08/07/2020 - 3:37pm
resilience
mimic defense
Hard disks
Electromagnetic radiation
dynamic heterogeneous redundancy structure
dynamic heterogeneous redundancy
DHR structure
air-gap attacks
air-gap attackers
Air gaps
game theory
Transmitters
Atmospheric modeling
security
Metrics
malicious software
malware
composability
network attack
Intrusion Detection
computer network security
Resiliency
Human Factors
Human behavior
pubcrawl
biblio
Ransomware Threat and its Impact on SCADA
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Ransom
Device Compromising
Downtime
Encrypting
human machine interface
ICs
Industrial Control Systems
industrial networks
industrial processes
Infected System
Locker
malicious software
Network
operation technology
Petya
programmable logic controllers
Data Mitigation
Ransomware
ransomware attack
Ransomware Deadline
Ransomware Incidents
Ransomware Prevention
Ransomware Strategies
Ransomware Taxonomy
ransomware threat
Ransomware Threating
Remote Terminal Units
SCADA systems
supervisory control and data acquisition
Threat report
WannaCry
cryptocurrency
invasive software
Cybersecurity
pubcrawl
Metrics
Resiliency
resilience
Human behavior
Computer crime
malware
Human Factors
control engineering computing
industrial control
information security
cybercrimes
production engineering computing
cryptojacking
business productivity
Coin Miner
critical infrastructure
critical infrastructures
Cryptor
Cyber Actor
cyber attack
cyber threat
cyber-attack incidents
cybercriminals
Data and System Access
Data Backup
Data Extortion
biblio
Cuckoo’s Malware Threat Scoring and Classification: Friend or Foe?
Submitted by grigby1 on Fri, 03/27/2020 - 11:38am
malware detection
Virtual machining
victim host system
threat scoring
threat score
threat classification rating
threat classification
threat alert
severity classification
scoring classification
sandbox
microsoft windows
measured response
malware threat classification
malware sample
malware incident response
tools
Malware behavior analysis
malware behavior
malicious software
automated tools
dynamic analysis
cuckoo sandbox
sandboxing
invasive software
malware
pattern classification
composability
policy-based governance
pubcrawl
information security
collaboration
biblio
Attention in Recurrent Neural Networks for Ransomware Detection
Submitted by aekwall on Mon, 10/07/2019 - 11:42am
Metrics
Windows environment
user access
Scalability
Resiliency
Recurrent neural networks
recurrent neural nets
ransomware sequences
ransomware executables
ransomware detection
ransomware attacks
Ransomware
pubcrawl
pattern locks
organizational level
Microprocessors
attention mechanisms
malware detection
malicious software
LSTM models
LSTM
Long short-term memory
Logic gates
learning (artificial intelligence)
invasive software
Human behavior
deep learning methods
deep learning
computer security
computer architecture
composability
biblio
Malware Classification Using Machine Learning Algorithms
Submitted by grigby1 on Mon, 06/10/2019 - 2:02pm
malicious software
Support vector machines
stealing deleting sensitive data
scripts
Resiliency
resilience
pubcrawl
privacy
pattern classification
Metrics
Malware crisis
malware classification
malware
computer architecture
malicious programs
machine learning algorithms
learning (artificial intelligence)
invasive software
internet
Human behavior
huge virtual world
encrypting deleting sensitive data
Decision trees
Correlation
core computing functions
Conferences
1
2
next ›
last »