Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-criminals
biblio
DeepMal: A CNN-LSTM Model for Malware Detection Based on Dynamic Semantic Behaviours
Submitted by aekwall on Mon, 02/08/2021 - 12:41pm
cyber-criminals
recurrent neural nets
Human Factors
LSTM
Compositionality
high-level abstractions
CNN-LSTM model
Cyber Dependencies
component-CNN
convolution
deep learning framework
DeepMal
dynamic semantic behaviours
evil intentions
locally spatial correlations
malicious programs
malware classification task
sequential longterm dependency
Metrics
malware
malware detection
invasive software
Data models
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
Scalability
Neurons
pattern classification
Training
machine learning
convolutional neural nets
natural language processing
NLP techniques
biblio
A theoretical review of social media usage by cyber-criminals
Submitted by grigby1 on Thu, 02/15/2018 - 10:44am
online social networking sites
tools
threats
stalking
spam
social networking (online)
social media usage
social media
Social Engineering Attacks
Scalability
Resiliency
resilience
pubcrawl
Phishing
click-jacking prevention
malware
invasive software
identity theft
Human Factors
human factor
Human behavior
Facebook
Electronic mail
cybercriminal
cyber-criminals
Cross Site Scripting (XSS)
Cross Site Scripting
Computer crime
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 1:03pm
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 9:32am
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Tue, 05/05/2015 - 9:51am
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions