Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
microsoft windows
biblio
A Malware Analysis and Artifact Capture Tool
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
microsoft windows
Windows
tools
Syntactics
static states
static analysis
source code (software)
sandbox
Resiliency
pubcrawl
process flow
obfuscation techniques
obfuscation
multiple code paths
Monitoring
artifact capture tool
Metrics
malware behavior
malware artifacts
Malware Analysis
malware
invasive software
interactive malware analysis
Human behavior
handwriting recognition
dynamic states
dynamic control
Disassemblers
Decompilers
debuggers
biblio
A light-weight malware static visual analysis for IoT infrastructure
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
large-scale malware
visualization
Resiliency
pubcrawl
MICS
Microwave integrated circuits
microsoft windows
Metrics
malware image classification system
malware family classification
malware attacks
Malware Analysis
malware
light-weight malware static visual analysis
classification
large-scale IoT malware
IoT infrastructure
invasive software
Internet of Things
image representation
image classification
hybrid local malware features
hybrid global malware features
Human behavior
gray-scale image
Gray-scale
feature extraction
Cloud Computing
biblio
Behavioral Malware Classification Using Convolutional Recurrent Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
Metrics
Training
static signature
Resiliency
resilience
Recurrent neural networks
recurrent neural nets
Radio frequency
pubcrawl
privacy
Prefetching
pattern classification
Microsoft Windows Prefetch files
microsoft windows
anti-virus systems
malware classification
malware
invasive software
Human behavior
feature extraction
convolutional recurrent neural networks
convolutional neural nets
computer viruses
behavioral malware detection
behavioral malware classifiers
behavioral malware classification
anti-virus vendor naming schemes
biblio
DLGraph: Malware Detection Using Deep Learning and Graph Embedding
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
Metrics
Windows application programming interface calls
Windows API calls
Trojan horses
static analysis
stacked denoising autoencoders
softmax regression
SDA
Resiliency
representation learning
pubcrawl
privacy
pattern classification
noise reduction
neural nets
microsoft windows
application program interfaces
malware detection
Malware Analysis
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding
function-call graphs
function-call graph
feature extraction
embedded vector
embedded systems
DLGraph
deep learning
combined feature vector classification
biblio
A New Statistical Method for Wormhole Attack Detection in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
number of new neighbors
wormhole attack detection
wormhole attack
wireless sensor networks
Training
telecommunication security
SWAN
statistical methods
security attacks
Routing protocols
Resiliency
pubcrawl
Ad hoc networks
number of neighbors
NS3 simulator
mobile wireless nodes
mobile computing
mobile ad hoc networks
microsoft windows
Metrics
MANET Attack Detection
MANET
delays
composability
biblio
FP-STALKER: Tracking Browser Fingerprint Evolutions
Submitted by grigby1 on Fri, 04/05/2019 - 10:26am
online front-ends
target tracking
Portable document format
FP-STALKER approach
browser instances
Resiliency
Compositionality
Browser Security
Fingerprint recognition
Browser Fingerprinting
privacy
microsoft windows
Browsers
learning (artificial intelligence)
Metrics
Human behavior
pubcrawl
resilience
security
data privacy
biblio
Low-Cost Breaking of a Unique Chinese Language CAPTCHA Using Curriculum Learning and Clustering
Submitted by aekwall on Mon, 04/01/2019 - 10:08am
security
learning (artificial intelligence)
low-cost breaking
machine learning methods
microsoft windows
natural language processing
OCR software
optical character recognition
pattern clustering
potential training methods
pubcrawl
Kernel
Task Analysis
text analysis
text distortion
text-based CAPTCHAs focus
Training
transcription tasks
unique Chinese language CAPTCHA
web services
Web sites
curriculum clustering
CAPTCHA
captchas
Chinese language question-and-answer Website
CNN
composability
convolution
convolutional neural network
convolutional neural networks
correct response
automated access
curriculum learning
feature map
feedforward neural nets
Human behavior
human user
image distortion
inverted character
inverted characters
inverted symbols
biblio
Behavioral Based Trust Metrics and the Smart Grid
Submitted by grigby1 on Fri, 03/22/2019 - 1:00pm
Smart Grid
pubcrawl
resilience
Resiliency
Routing
Scalability
security
security of data
service level strategies
power system security
smart power grids
statistical analysis
substation protection
Substations
telecommunication network routing
trust levels
trust measurements
Trusted Communications
learning (artificial intelligence)
behavioral pattern analysis
big data security
communication routing
critical components
electrical grid
Entropy
Grid Security
Grid Trust
behavioral based trust metrics
Mathematical model
Metrics
microsoft windows
Monitoring
network anomaly detection
network security
power engineering computing
biblio
A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
network-based intrusion systems
execution sequences
fileless malware
host based intrusion detection system
installed applications
lightweight host-based intrusion detection system
malicious activities
malicious e-mail attachments
management tools
network administrators
enterprise networks
OS vendors
PowerShell process
process generation patterns
process information
serious social problem
Spreadsheet programs
system constructs process trees
targeting organizations
XML
microsoft windows
tools
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
drive-by-download attacks
Intrusion Detection
security of data
Organizations
advanced persistent threat
advanced persistent threats
active processes
anomaly processes
anti-virus software
computer viruses
Electronic mail
biblio
Comparing Web Cache Implementations for Fast O(1) Updates Based on LRU, LFU and Score Gated Strategies
Submitted by grigby1 on Wed, 01/16/2019 - 2:37pm
runtime performance
hit rate
hypermedia
implementation
information technology
least frequently used (LFU)
least recently used (LRU)
least recently used replacement principle
LRU replacement principle
network optimization criteria
performance optimization
high user request workloads
score gated LRU
score gated polling
score gated polling (SGP)
Score Gated strategies
transport protocols
web cache implementations
Web cache strategies
web caching strategies
window LFU
cache storage
Computational modeling
pubcrawl
Metrics
Resiliency
Scalability
Complexity theory
simulation
Logic gates
Conferences
internet
data structures
microsoft windows
Windows
Web Caching
achieved hit rate performance
arbitrary score assessment
cache performance
fast O(1) updates
fast updating
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »