Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ransomware
biblio
Dynamic Ransomware Protection Using Deterministic Random Bit Generator
Submitted by grigby1 on Thu, 05/24/2018 - 12:16pm
protection
Scalability
Resiliency
resilience
Ransomware
random number generator
random number generation service
random number generation
random key generation
public key cryptography
Public key
pubcrawl
Communication networks
Metrics
malware
Human behavior
Generators
encryption key
encryption
dynamic ransomware protection method
deterministic random bit generator
CryptoVirus
crypto-API
computer viruses
biblio
RansHunt: A Support Vector Machines Based Ransomware Analysis Framework with Integrated Feature Set
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
ransomware families
malwares
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
RansHunt
Ransomware
ransomware analysis framework
malware
ransomware samples
ransomware variants
sandboxing
static analysis
static code features
static features
Support vector machines
Algorithm design and analysis
machine learning
learning (artificial intelligence)
invasive software
integrated feature set
individual analysis approach
hybrid cryptosystem
Heuristic algorithms
feature extraction
Electronic mail
dynamic analysis
cyber-crime
Cryptography
crypto-ransomwares
composability
collaboration
biblio
POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality
Submitted by grigby1 on Mon, 03/05/2018 - 1:15pm
composability
cyber deception
filesystems
intrusion detection and prevention
Metrics
pubcrawl
Ransomware
resilience
Resiliency
biblio
Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph
Submitted by grigby1 on Mon, 03/05/2018 - 1:15pm
API CFG (calls flow graph)
composability
Data mining
dynamic analysis
Metrics
pubcrawl
Ransomware
ransomware detection
resilience
Resiliency
biblio
How to Make Efficient Decoy Files for Ransomware Detection?
Submitted by grigby1 on Mon, 03/05/2018 - 1:15pm
Access Control
composability
Decoy
File I/O
Metrics
pubcrawl
Ransomware
resilience
Resiliency
biblio
Negation of Ransomware via Gamification and Enforcement of Standards
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
composability
Gamification
law enforcement
Metrics
pubcrawl
Ransomware
resilience
Resiliency
standardization
biblio
Secure Protocol for Subscriber Identity Module
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
SIM
Protocols
pubcrawl
Ransomware
resilience
Resiliency
secure protocol
service provider
short messaging service
Poles and towers
social engineering
stolen SIM
subscriber Identity Module
user contacts
user credentials
user sensitive information
VLR
HLR
authorisation
banking information
Carrier
composability
current SIM model
data privacy
ECC
Elliptic curve cryptography
authentication
IMSI
internet
message authentication
Metrics
Mobile communication
Mobile handsets
modern mobile communication
biblio
A First Estimation of the Proportion of Cybercriminal Entities in the Bitcoin Ecosystem Using Supervised Machine Learning
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
Public key
learning (artificial intelligence)
machine learning
malware
Metrics
pattern classification
Peer-to-peer computing
peer-to-peer payment system
proportion estimation
pubcrawl
illicit activities
Ransomware
resilience
Resiliency
security of data
supervised learning
supervised learning classifiers
supervised machine learning
uncategorised observations
Cybercrime
bitcoin
Bitcoin ecosystem
Bitcoin transactions
blockchain
composability
Computer crime
cryptocurrency
cyber-criminal entities
Bagging classifiers
cybercrime-related categories
cybercriminal entities
Ecosystem
Ecosystems
financial data processing
Gradient Boosting classifiers
gradient methods
illegal goods trading
biblio
Reasoning Crypto Ransomware Infection Vectors with Bayesian Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
Infection Vector
uncertainty
Resiliency
resilience
Ransomware
pubcrawl
Payloads
Nickel
Metrics
malware
invasive software
Bayes methods
encryption
Cryptography
crypto ransomware infection vectors
crypto ransomware
conditional probability
composability
belief networks
Bayesian network statistics
Bayesian network
biblio
Detection and Prevention of Crypto-Ransomware
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
Elliptic curve cryptography
Servers
Resiliency
resilience
Ransomware
pubcrawl
Private-key cryptosystem ransomware
Payloads
Metrics
malware
file types
encryption
bitcoin
Electronic mail
Domain Generated Algorithm (DGA)
cybercriminals
Cryptography
Cryptographic Ransomware (CGR)
crypto-ransomware prevention
crypto-ransomware detection
Crypto-Ransomware
computer viruses
Computer crime
composability
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »