Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

Signature based

biblio

Visible to the public Prevention of Ransomware Execution in Enterprise Environment on Windows OS: Assessment of Application Whitelisting Solutions

Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
  • unauthorized applications
  • Organizations
  • pubcrawl
  • Ransomware
  • ransomware execution prevention
  • Resiliency
  • SecureAPlus
  • Signature based
  • Trusted Computing
  • Microsoft Windows (operating systems)
  • virtual environment
  • VoodooShield
  • whitelisting
  • Windows edition
  • Windows Operating System Security
  • Windows OS
  • Windows Server edition
  • zero-day antimalware solution
  • composability
  • application control solutions
  • application whitelisting software
  • Application Whitelisting Solutions
  • AppLocker
  • authorisation
  • blacklisting
  • business data processing
  • CodeShield
  • administrative privileges
  • Cryptography
  • data breach prevention
  • Databases
  • enterprise environment
  • invasive software
  • malicious files
  • malware
  • Metrics
biblio

Visible to the public A Lifecycle Based Approach for Malware Analysis

Submitted by BrandonB on Wed, 05/06/2015 - 2:58pm
  • malicious outbound propagation
  • Zero day attack
  • spontaneous attack
  • specification-based detection
  • signature-based approach
  • Signature based
  • Reconnaissance
  • Polymorphic
  • peer coordination
  • network surveillance
  • Monitoring
  • Metamorphic
  • Malware Analysis
  • malware
  • anomaly based approach
  • local reconnaissance
  • lifecycle based approach
  • invasive software
  • inbound scan
  • inbound attack
  • hiding techniques
  • egg download
  • Educational institutions
  • device infection
  • Computers
  • client-side exploit
  • attack preparation

Terms of Use  |  ©2023. CPS-VO