Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sandbox
biblio
Zero-Day Attack Detection and Prevention in Software-Defined Networks
Submitted by grigby1 on Fri, 03/27/2020 - 11:38am
Zero day attacks
defense
collaboration
composability
controller
Intrusion Detection System (IDS)
Mininet
policy-based governance
pubcrawl
sandbox
sandboxing
SDN
Switch
zero-day attack
biblio
Cuckoo’s Malware Threat Scoring and Classification: Friend or Foe?
Submitted by grigby1 on Fri, 03/27/2020 - 11:38am
malware detection
Virtual machining
victim host system
threat scoring
threat score
threat classification rating
threat classification
threat alert
severity classification
scoring classification
sandbox
microsoft windows
measured response
malware threat classification
malware sample
malware incident response
tools
Malware behavior analysis
malware behavior
malicious software
automated tools
dynamic analysis
cuckoo sandbox
sandboxing
invasive software
malware
pattern classification
composability
policy-based governance
pubcrawl
information security
collaboration
biblio
CapeVM: A Safe and Fast Virtual Machine for Resource-Constrained Internet-of-Things Devices
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
ahead-of-time compilers
collaboration
fault isolation
Human behavior
Human Factors
Metrics
Performance
policy-based governance
pubcrawl
resilience
Resiliency
Safe Coding
Safety
sandbox
sensor nodes
virtual machines
biblio
A Malware Analysis and Artifact Capture Tool
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
microsoft windows
Windows
tools
Syntactics
static states
static analysis
source code (software)
sandbox
Resiliency
pubcrawl
process flow
obfuscation techniques
obfuscation
multiple code paths
Monitoring
artifact capture tool
Metrics
malware behavior
malware artifacts
Malware Analysis
malware
invasive software
interactive malware analysis
Human behavior
handwriting recognition
dynamic states
dynamic control
Disassemblers
Decompilers
debuggers
biblio
IoT Sandbox: To Analysis IoT Malware Zollard
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
collaboration
composability
IoT
malware
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
sandbox
sandboxing
biblio
Fine-Grained Supervision and Restriction of Biomedical Applications in Linux Containers
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
program libraries
medical administrative data processing
medical data processing
Monitoring
multidimensional biosignal recordings normalization
operating system
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
Process Supervision
Linux containers
pubcrawl
sandbox
sandboxing
security
security of data
security technologies
system call filtering
System Call Interception
Containers
application analysis
biomedical application restriction
biomedical data
Cloud Computing
collaboration
complex programs
composability
container portability
algorithm development
data analysis
distributed processing
docker-based container
external code repositories
fine-grained restricted environment
fine-grained supervision
Kernel
Linux
biblio
Malware Detection for Secure Microgrids: CoSSMic Case Study
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
Microgrids
vulnerability detection
SmartGrid
smart-devices
security vulnerability
security threats
security
sandbox
Resiliency
pubcrawl
Protocols
power system security
power engineering computing
performance evaluation
Monitoring
Compositionality
microgrid ecosystem
microgrid
Metrics
malware detection
malware
invasive software
Human behavior
energy infrastructure
electric microgrids
distributed power generation
Cybersecurity
cyber vulnerabilities
CoSSMic project
biblio
Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts
Submitted by grigby1 on Tue, 01/16/2018 - 6:34pm
malware sandboxes
wear-and-tear artifacts
Virtualization
Virtual machining
tools
statistical models
statistical analysis
spotless sandboxes
security
Scalability
sandbox evasion techniques
sandbox
Resiliency
pubcrawl
Metrics
Bare-metal Host
malware analysis systems
Malware Analysis
malware
invasive software
Instruments
Human Factors
evasion
Environment Aware Malware
dynamic analysis
Decision trees
data analysis
Companies
BIOS Security
biblio
Security sandbox model for modern web environment
Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
nontrusted applications
Web Browser Security
Web browsers
security Sandbox model
security of data
security
sandbox
Resiliency
pubcrawl
privilege
online front-ends
browser
modern Web environment
Metrics
Kernel
internet
Human behavior
Hardware
filter
browser vulnerabilities
Browsers
biblio
Transitioning Native Application into Virtual Machine by Using Hardware Virtualization Extensions
Submitted by grigby1 on Mon, 11/20/2017 - 12:31pm
security
operating system service virtualization
Policy
policy-based governance
process maliciousness
process virtual machine
program flow control
pubcrawl
sandbox
sandboxing
operating system kernels
system call virtualization
untrusted application behaviour control
untrusted application behaviour monitoring
virtual machine equivalent isolation
virtual machines
Virtual machining
virtualisation
Virtualization
hardware virtualization extensions
composability
confined malicious application
execution overheads
file system access
Governance
Government
Hardware
Hardware virtualization
code vulnerabilities
isolation
Kernel
kernel operating system
Libraries
Linux
Linux process
Memory management
operating system
« first
‹ previous
1
2
3
next ›
last »