Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security community
biblio
Intelligent Malware Detection Using Oblique Random Forest Paradigm
Submitted by grigby1 on Mon, 06/10/2019 - 1:02pm
resilience
malware classification datasets
Metrics
Oblique Random Forest
oblique random forest ensemble learning technique
oblique random forest paradigm
pattern classification
privacy
pubcrawl
malware classification
Resiliency
security community
signature-based detection techniques
stealthy malware
Support vector machines
Trojan horses
unknown malware
behavior-based detection techniques
malware behavior
machine learning solutions
machine learning
learning (artificial intelligence)
invasive software
intelligent malware detection
Human behavior
Forestry
feature extraction
false positive rate
Decision trees
decision tree learning models
computerized online applications
comprehensive malware detection
classification accuracy
biblio
Automating Threat Intelligence for SDL
Submitted by aekwall on Mon, 03/04/2019 - 9:49am
open source threat information sources mining
Automated Secure Software Engineering
vulnerability disclosure
threat intelligence
tactical threat intelligence
Stakeholders
security development lifecycle
security community
SDL
product specific threat indicators
product security
product development
Product design
product deployment
security of data
IT infrastructure
Feeds
enterprise information technology infrastructure
software engineering
Data mining
Databases
composability
pubcrawl
Resiliency
security
malware
Conferences
biblio
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree
Submitted by grigby1 on Thu, 08/23/2018 - 10:57am
Merkle history tree
Chameleon hash
chameleon hashing
concurrent authenticated tree
Concurrent Authentication
concurrent large-scale log streams
cryptographic hashing
discrete log
highly concurrent scale log streams
large-scale distributed applications
large-scale distributed systems
log data
log management tools
logarithmic number
Cats
Merkle-tree approach
providing security
public verifiability
resource-constrained systems
secure audit logging schemes
Secure logging
secure logging system
security community
space-efficiency
tamper-evident logging
tree data structures
untrusted machine
History
Concurrency
cyber-physical systems
pubcrawl
composability
Cryptography
system monitoring
distributed processing
Servers
authentication
Analytical models
tools
data structure
data structures
security
resilience
data integrity
Metrics
program verification
Resiliency
forward security
integrity verification
digital signatures
distributed system
integrity
concurrency control
audit logs
biblio
"WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaigns"
Submitted by abfox on Tue, 02/14/2017 - 12:37pm
Markov Models
WAP
Topology
system survivability
Survivability
Steady-state
soft impacts
security community
security
scanning nodes
rejuvenation
quarantine
pubcrawl170101
probability
network topology
Mathematical model
advanced persistent threat
malware infections
malware
invasive software
infection probability
four-node topology
false positives
false negatives
early malware detection
critical infrastructures
critical infrastructure sectors
Critical Infrastructure Protection
coordinated massive malware campaign assessment
contagion probability
Analytical models
advanced persistent threats