Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
antivirus
biblio
A Multi-Layered Defense Approach to Safeguard Against Ransomware
Submitted by aekwall on Thu, 07/14/2022 - 4:20pm
Ransomware
Web Filtering
layered defense
email security
antivirus
Antimalware
DNS
pubcrawl
cyber security
malware
security
composability
Resiliency
Metrics
Conferences
Computer crime
tools
Medical services
Training
biblio
Remote Attestation based Software Integrity of IoT devices
Submitted by aekwall on Mon, 12/07/2020 - 12:24pm
neural style transfer
trusted solution
trusted platform modules
Trusted Computing
tpm
telecommunication security
software trusted platform module
software integrity
security issues
Scalability
Resiliency
reasonable computational power
pubcrawl
Predictive Metrics
antivirus
message authentication
IoT devices
IoT
Internet of Things
HMAC values
HMAC
hashed message authentication code
cyber-physical system security
Cryptography
Cryptographic Protocols
cryptographic operations
composability
biblio
Linux Security: A Survey
Submitted by aekwall on Mon, 10/26/2020 - 11:46am
password
Linux Operating System Security
Linux security
firewall security
file permissions
File
antivirus
firewall
Predictive Metrics
microsoft windows
authorisation
Business
Metrics
composability
pubcrawl
Resiliency
Linux
invasive software
security
malware
biblio
Cyber Security at a Glance
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Sniffing
data records
DDoS and DOS attacks
DDoS Attack
distributed denial-of-service attack
firewall
hacking techniques
man in the middle attack
polymorphic virus
proxy
computer malwares
social engineering
spoofing
Tor browser
trojan
Trojan horses
Trojans
vpn
Worm
BIOS Security
Human Factors
Computer crime
Firewalls (computing)
internet
pubcrawl
Metrics
Resiliency
resilience
cyber security
malware
Scalability
Cyber Attacks
Computer hacking
denial-of-service attack
computer viruses
antivirus
BeEF
boot sector virus
Brute forcing
biblio
On Studying the Antivirus Behavior on Kernel Activities
Submitted by grigby1 on Thu, 03/28/2019 - 3:14pm
resilience
pubcrawl
Scalability
Performance
Resiliency
antivirus
minifilter device driver
signature based defense
biblio
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
Submitted by grigby1 on Fri, 11/03/2017 - 11:27am
Intrusion Detection
user file encryption
user data
Resiliency
ransomware behavior analysis
ransomware attacks
Ransomware
pubcrawl
Monitoring
Metrics
malware
invasive software
Intrusion Detection Systems
antivirus
Human behavior
file decryption
Entropy
encryption
early-warning detection system
Data protection
CryptoLock
Cryptography
composability
behavioral analysis
behavior indicators
arrays
biblio
Malicious data classification using structural information and behavioral specifications in executables
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
Software
malwares
NtTrace
obfuscation technology
pattern classification
program diagnostics
security devices
signature database
signature-based detection system
malware detection system efficiency improvement
static analysis
structural information
Syntactics
system calls
threat detection
threat mitigation
underground Internet economy
zero-day malware detection
internet
antivirus
automated malicious programs
behavioral specifications
Classification algorithms
dynamic analysis
executable file
feature extraction
Information systems
Algorithm design and analysis
invasive software
malicious behavior extraction
malicious data classification
malicious software detection
malicious software mitigation
malware
malware detection
malware detection system effectiveness improvement