Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
microsoft windows
biblio
A tool to compute approximation matching between windows processes
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
digital forensics scenarios
Windows Operating System Security
windows processes
Windows memory dump
Windows
volatility
memory image file
image matching
Image forensics
forensics memory image
Forensics
forensic memory analysis
forensic analysis
file organisation
executable file
dumping process
tools
cryptographic hashing functions
cryptographic hash values
bytewise approximate matching
Binary codes
approximation matching algorithms
Approximation algorithms
Microsoft Windows (operating systems)
microsoft windows
Cryptography
malware
composability
Resiliency
Metrics
pubcrawl
biblio
Windows Virtualization Architecture For Cyber Threats Detection
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
Virtual machine monitors
prediction tool
prediction tools development
pubcrawl
Real-time monitoring
Resiliency
Rootkits
static methods
system monitoring
target Windows machines
virtual machine introspection
Microsoft Windows (operating systems)
virtual machines
virtual memory introspection
Virtualization
VMI
Windows operating system
Windows Operating System Security
Windows OS
Windows threat detection
Windows virtualization architecture
Xen hypervisor
machine learning
composability
cyber breaches
cyber threats detection
Cybersecurity
data structures
hidden security issues
invasive software
Kernel
kernel data structures
learning (artificial intelligence)
alert system administrators
machine learning techniques
malicious process behavior
malware
malware detection
malware threats
memory data structure identification
memory forensic analysis
Metrics
microsoft windows
biblio
A Content Auditing Method of IPsec VPN
Submitted by grigby1 on Wed, 11/14/2018 - 1:13pm
man-in-the-middle mechanism
Windows
VPN technology
Virtual private networks
Servers
Resiliency
resilience
public domain software
pubcrawl
prototype system
Protocols
operating systems (computers)
operating systems
microsoft windows
Metrics
encryption audits
IPv4 network environment
IPsec VPN users
IPsec VPN
IP networks
internet
encryption
DPDK technology
DPDK
default configuration
content auditing method
Compositionality
authentication
auditing
audit system
biblio
Profile hidden Markov model for malware classification \#x2014; usage of system call sequence for malware classification
Submitted by grigby1 on Wed, 06/20/2018 - 12:55pm
obfuscation
Trojan horses
tools
system call sequence
system call
Resiliency
resilience
pubcrawl
proteins
protein sequences
profile hidden markov model
privacy
pattern classification
obfuscation technique
bioinformatics
microsoft windows
Metrics
malware technology
malware files
malware classification
malware
invasive software
Human behavior
Hidden Markov models
Grippers
DNA sequences
DNA
biological informatics
biblio
An evaluation of region based object detection strategies within X-ray baggage security imagery
Submitted by grigby1 on Thu, 06/07/2018 - 3:03pm
security
policy-based governance
Policy-Governed Secure Collaboration
Proposals
pubcrawl
R-CNN/R-FCN variants
region based object detection
resilience
Resiliency
ResNet-101
Policy
sliding window driven CNN approach
SWCNN
Task Analysis
transfer learning
VGG16
Weapons
X-ray baggage security
X-ray baggage security imagery
X-ray imaging
image classification
cluttered X-ray security imagery
collaboration
convolution
cyber physical systems
deep learning
Faster Region-based CNN
feature extraction
first-stage region proposal
Fully Convolutional Networks
class firearm detection problem
ImageNet dataset
learning (artificial intelligence)
Metrics
microsoft windows
neural nets
neural networks security
object class X-ray detection problem
object detection
object localization strategies
biblio
Wearable Device User Authentication Using Physiological and Behavioral Metrics
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
sensors
physiological data
Physiological Fingerprint
physiological metrics
privacy
pubcrawl
Reliable Data Collection
resilience
Resiliency
Scalability
patient monitoring
smart wearables
standards
wearable computers
wearable device user authentication
Wearable Security
Wearable-User Authentication
wearable-user authentication mechanism
wearables security
wellness-related metrics
health care
Apple Watch
authentication
authorisation
behavioral metrics
Biomedical monitoring
biometrics (access control)
coarse-grain minute-level physical activity
feature extraction
Fitbit users
Activity-based Fingerprint
Healthcare
healthcare providers
Heart rate
Human behavior
message authentication
Microsoft Band
microsoft windows
mobile computing
one-time authentication approaches
biblio
Unified Approach for Operating System Comparisons with Windows OS Case Study
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Three-dimensional displays
operational level benchmarking
operational level performance
OS security features
pubcrawl
resilience
Resiliency
security
security of data
operating systems (computers)
unified approach
unified benchmarking approach
Windows 7
Windows 8
Windows operating system
Windows OS
Windows OS case study
Windows XP
graphics processing units
Benchmark testing
Benchmarking
composability
conventional personal computer
DirectX 11
efficient benchmark systems
gpu
Graphics
automated benchmarking tools
Hardware
hardware level
hardware technology
Metrics
microsoft windows
operating system
operating systems
biblio
Overview of Firewalls: Types and Policies: Managing Windows Embedded Firewall Programmatically
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Protocols
network security
Open Port
operating systems (computers)
Packet
Packets filtering
Ports (Computers)
preconfigured rules
private networks
network attacks
pubcrawl
resilience
Resiliency
security
Windows
Windows embedded firewall
Windows operating system
firewalls
composability
computer network security
computer security
Filtering
firewall
Firewall Exception
firewall policies
firewall rules
Authorize Application
Firewalls (computing)
firewalls types
internet
IP networks
Metrics
microsoft windows
Network
file
07965451.pdf
Submitted by drwright on Wed, 09/06/2017 - 11:29am
RASA
test efforts
Stack traces
Software systems
software engineering
software development lifecycle
security of data
security
risk-based attack surface approximation
attack surface
random sampling
proactive security reviews
prediction models
Mozilla Firefox
microsoft windows
Measurement
Computer bugs
biblio
Risk-based attack surface approximation: how much data is enough?
Submitted by drwright on Wed, 09/06/2017 - 11:29am
RASA
test efforts
Stack traces
Software systems
software engineering
software development lifecycle
security of data
security
risk-based attack surface approximation
attack surface
random sampling
proactive security reviews
prediction models
Mozilla Firefox
microsoft windows
Measurement
Computer bugs
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »