Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware attacks
biblio
Cyber Risk: The emerging cyber threat to industrial control systems
Submitted by willirn1 on Tue, 10/26/2021 - 3:20pm
cyber risk
C3E
cyber threat
Industrial Control Systems
supply chains
malware
malware attacks
Compromise
distribution
biblio
Image-Based Unknown Malware Classification with Few-Shot Learning Models
Submitted by grigby1 on Thu, 10/29/2020 - 10:10am
malware types
well-known models
Resiliency
resilience
pubcrawl
Prototypical Networks
proper defense policies
privacy
pattern classification
network system
microsoft malware classification challenge
Microsoft Malware Classification
Metrics
Matching Networks
massive benefit
automatic protection systems
malware samples
malware research
malware datasets
malware classification problems
malware classification
malware attacks
MalImg
machine learning area
learning (artificial intelligence)
invasive software
image-based unknown malware classification
Human behavior
few-shot learning models
few shot learning
biblio
IoT Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:12am
machine learning
Ollydebug
IoT malware analysis
information system integrity
information system confidentiality
information system availability
CIA triad
malicious users
malicious software
Predictive Metrics
malware attacks
Malware Analysis
image recognition
privacy
IoT
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
invasive software
security
malware
data integrity
IoT devices
Internet of Things
Conferences
biblio
To Detect Malware attacks for an Autonomic Self-Heal Approach of Virtual Machines in Cloud Computing
Submitted by grigby1 on Mon, 03/09/2020 - 12:25pm
public cloud services
Virtual machining
virtual machines memory snapshots API call sequences
virtual machines
virtual machine snapshots
virtual machine security
Virtual machine monitors
unsupervised machine
unattacked virtual machine memory snapshots
supervised machine learning techniques
self-heal approach
self-heal algorithm
Self-Heal
security features
security
API calls
pubcrawl
private cloud environment
private cloud
operating systems
Monitoring
malware attacks
malware
machine learning algorithms
learning (artificial intelligence)
invasive software
Cloud Computing
attack model
application program interfaces
biblio
A Multi-Classifier Framework for Open Source Malware Forensics
Submitted by grigby1 on Mon, 07/01/2019 - 9:06am
pattern classification
machine learning models
malware
malware analysis reports
malware attacks
malware forensics
manual analysis
multiclassifier framework
open source malware forensics
open source malware sandbox
machine learning algorithms
pubcrawl
resilience
Resiliency
Scalability
Security Heuristics
security of data
traditional anti-virus technologies
Training
ever-evolving threats
Bayes methods
computer network security
computer viruses
cyber attack pattern
Cyber Attacks
data cleaning
Data mining
Data models
automated manner
extensive pre-modeling techniques
feature extraction
future cyber threats
Gaussian Naive Bayes classifier
heuristics updates
invasive software
learning (artificial intelligence)
machine learning
biblio
A light-weight malware static visual analysis for IoT infrastructure
Submitted by aekwall on Mon, 06/24/2019 - 1:41pm
large-scale malware
visualization
Resiliency
pubcrawl
MICS
Microwave integrated circuits
microsoft windows
Metrics
malware image classification system
malware family classification
malware attacks
Malware Analysis
malware
light-weight malware static visual analysis
classification
large-scale IoT malware
IoT infrastructure
invasive software
Internet of Things
image representation
image classification
hybrid local malware features
hybrid global malware features
Human behavior
gray-scale image
Gray-scale
feature extraction
Cloud Computing
biblio
Anomaly Detection in Cyber Security Attacks on Networks Using MLP Deep Learning
Submitted by grigby1 on Fri, 03/22/2019 - 12:01pm
J48
WEKA
Scalability
Resiliency
resilience
pubcrawl
multilayer perceptrons
Multilayer Perceptron (MLP)
Multilayer Perceptron
MLP deep learning
Metrics
malware data
malware attacks
malware
machine learning
learning (artificial intelligence)
Advanced Security Network Metrics \\& NonPayload-Based Obfuscations
invasive software
information security
ID3
feature extraction
deep learning
Decision trees
cyber security threats
cyber security attacks
cyber security
Correlation
computer network security
C4.5
big data security
Big Data
Anomaly Detection
biblio
Analyst Intuition Inspired High Velocity Big Data Analysis Using PCA Ranked Fuzzy K-Means Clustering with Multi-Layer Perceptron (MLP) to Obviate Cyber Security Risk
Submitted by grigby1 on Wed, 11/14/2018 - 12:21pm
pattern classification
learning (artificial intelligence)
log history annotation
malware
malware attacks
manually labelled data
MLP
Monitoring
Multi-layer Perceptron (MLP)
multilayer perceptrons
network datasets
network protocols
network user
neural network classifier multilayer perceptron base
IP networks
pattern clustering
PCA ranked fuzzy k-means clustering
principal component analysis
Principal Component Analysis (PCA)
pubcrawl
resilience
Resiliency
Scalability
scoring system
security
special semisupervise method
statistical data generation
Virus
cyber threats
analyst intuition inspired high velocity big data analysis
Artificial Intelligence
attacker IP addresses characteristics
Big Data
Clustering algorithms
computer networks
computer network security
computer security
cyber-attacks
cyber security
cyber security expert
cyber security log classification
cyber security risk
Analyst Intuition
data analysis
Data mining
efficient security monitoring system
Expectation Regulated
expert system
expert systems
Fuzzy k-means (FKM)
fuzzy set theory
High Velocity
Human behavior
integrated datasets
invasive software
biblio
A Control Flow Graph-Based Signature for Packer Identification
Submitted by grigby1 on Wed, 05/30/2018 - 3:05pm
malware
single signature
signature based defense
Scalability
Resiliency
resilience
Reliability
pubcrawl
packer identification
malware samples
malware detection
malware attacks
Malware Analysis
byte signatures
invasive software
Intel Security Labs
feature extraction
Entropy
Electronic mail
Cryptowall malware
Cryptography
control flow graph
computer security
CFG-based signatures
byte-string signatures
biblio
Optimizing Detection of Malware Attacks through Graph-Based Approach
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
Metrics
hook attacks
Host-based
invasive software
Kernel
malicious code execution
malicious system call
malware
malware attacks
Graph-model
Monitoring
optimisation
optimization
pubcrawl
resilience
Resiliency
signature-based model
tools
computer viruses
API hook
application program interfaces
application programming interface
attack graphs
code obfuscation technique
communication technology
composability
Computational modeling
API graph-based model
Computers
digital signatures
graph comparison
graph partition
graph theory
graph-based approach
graph-generation
1
2
next ›
last »