Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious software
biblio
Classifying Malware Using Convolutional Gated Neural Network
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
malware classification
Task Analysis
Resiliency
resilience
Recurrent neural networks
recurrent neural nets
pubcrawl
privacy
pattern classification
neural network
microsoft malware classification challenge
Metrics
malware detection
CNN
malware
malicious software
machine learning
Logic gates
invasive software
information technology society
Human behavior
Gated Recurrent Unit
feedforward neural nets
Deep Neural Network
convolutional neural networks
convolutional gated recurrent neural network model
biblio
Real-time classification of malicious URLs on Twitter using machine activity data
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
malware
Web pages
user machines
Uniform resource locators
Twitter data
Twitter
Superbowl
social networking (online)
real-time systems
real-time malicious URL classification
pubcrawl170109
pattern classification
online social networks
Computer crime
malicious software behaviour
malicious software
malicious server
machine classification system
machine activity logs
machine activity data
invasive software
drive-by-download
Data models
cyber criminals
Cricket World Cup
biblio
A Novel Identity Authentication Scheme of Wireless Mesh Network Based on Improved Kerberos Protocol
Submitted by BrandonB on Tue, 05/05/2015 - 9:03am
password guessing attack
wireless mesh networks
wireless mesh network
synchronisation
storing key
Servers
random numbers
public key encryption
public key cryptography
Public key
Protocols
authentication
malicious software
Kerberos protocol
improved Kerberos protocol
identity authentication scheme
identity authentication
Cryptographic Protocols
clock synchronization
authorization
authentication protocol
« first
‹ previous
1
2