Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
static detection method
biblio
Stealthy Trojan Detection Based on Feature Analysis of Circuit Structure
Submitted by aekwall on Mon, 03/16/2020 - 9:39am
pubcrawl
trustiness verification methods
Stealthy Trojan node
stealthy Trojan detection
stealthy
static detection method
scalable verification framework
scalable verification
Scalability
Resiliency
circuit structure
Predictive Metrics
malicious HT
ISCAS benchmarks
invasive software
hardware trojan
formal verification
feature analysis
design methods
Compositionality
biblio
Research on Mobile Application Local Denial of Service Vulnerability Detection Technology Based on Rule Matching
Submitted by aekwall on Mon, 02/17/2020 - 1:42pm
formal verification
static detection method
smali abstract syntax tree
rule matching
mobile-application
mobile application market
malicious application flooding
local denial of service vulnerability detection technology
hook verification
dynamic detection method
-static-detection
-security-vulnerability
-rule-matching
-dynamic-detection
Computer crashes
Monitoring
Compositionality
smart phones
vulnerability detection
Communication networks
Mobile Applications
pattern matching
Metrics
pubcrawl
Human behavior
Resiliency
feature extraction
mobile computing
invasive software
security
biblio
"A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:18pm
malware
zero-day exploit
wavelet transforms
wavelet transform
wavelet package analysis
wavelet analysis
static detection method
pubcrawl170101
Portable document format
persistent threat attacks
Compounds
malicious program
malicious document detection system
malicious document detection
malicious code
invasive software
infected compound document
feature extraction
entropy analysis componen
document handling