Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
dataset
biblio
Rotten Apples Spoil the Bunch: An Anatomy of Google Play Malware
Submitted by grigby1 on Mon, 09/18/2023 - 3:35pm
malware detection
manual analysis
Resiliency Coordinator
Behavioral sciences
codes
Malware Analysis
graph theory
software engineering
android
dataset
pubcrawl
malware
Payloads
Manuals
internet
privacy
Resiliency
resilience
Metrics
Human behavior
biblio
On the Effectiveness of Application Permissions for Android Ransomware Detection
Submitted by aekwall on Mon, 10/04/2021 - 12:54pm
malware
pattern locks
permissions
dataset
Data mining
applications
android
Accuracy
detection
Ransomware
security
Human behavior
Resiliency
Scalability
pubcrawl
feature extraction
Analytical models
Predictive models
internet
computer science
biblio
Data Analytics-Enabled Intrusion Detection: Evaluations of ToNİoT Linux Datasets
Submitted by aekwall on Wed, 07/07/2021 - 4:09pm
Intrusion Detection
virtualization privacy
security
Resiliency
pubcrawl
privacy
operating systems
Metrics
Linux Systems
Linux
Linux Operating System Security
Internet of Things
Human behavior
dataset
data privacy
Cyber Attacks
computer architecture
composability
Artificial Intelligence
biblio
Unmasking Windows Advanced Persistent Threat Execution
Submitted by grigby1 on Wed, 05/05/2021 - 11:58am
dataset
statistical analysis
security
Scalability
sandboxing
pubcrawl
policy-based governance
Manuals
Industries
feature extraction
advanced persistent threat
data privacy
cyber security
Conferences
composability
collaboration agreements
collaboration
APT Execution
APT
biblio
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions
Submitted by grigby1 on Tue, 11/12/2019 - 3:25pm
Snyk platform
pattern classification
performing algorithm
performing models
Prediction algorithms
prediction models
Predictive models
predictive security metrics
pubcrawl
public databases
re-sampling strategies
security
security vulnerabilities
node security project
software metrics
software security issues
static source code metrics
Support vector machines
SVM
viable practical approach
Vulnerability
vulnerability information
vulnerable components
vulnerable functions
vulnerable javascript functions
Java
code fixing patches
code metrics
Computer crime
cyber-crime activities
Databases
dataset
deep learnin
deep learning
extensive grid-search algorithm
F-measure
forest based classifiers
GitHub
challenging machine
JavaScript
JavaScript programs
learning (artificial intelligence)
machie learning
machine learning
machine learning algorithms
Measurement
Metrics
mitigation techniques
natural language processing
nearest neighbour methods
biblio
How Far Can We Push Flow Analysis to Identify Encrypted Anonymity Network Traffic?
Submitted by grigby1 on Thu, 01/31/2019 - 11:19am
JonDonym
traffic flow Identification
traffic flow behavior
Traffic flow
Tor
tools
telecommunication traffic
Resiliency
resilience
pubcrawl
Protocols
Metrics
machine learning
learning (artificial intelligence)
anonymity
internet
I2P
Human Factors
Human behavior
flow analysis approach
encryption
encrypted anonymity network traffic
dataset
data privacy
Cryptography
composability
Bandwidth
anonymity network users
biblio
USED: A Large-scale Social Event Detection Dataset
Submitted by grigby1 on Mon, 07/24/2017 - 12:42pm
belief networks
CNN
collaboration
composability
dataset
event detection
Human behavior
Metrics
multimedia indexing
Policy
pubcrawl
Resiliency
Scalability
biblio
GNMID14: A Collection of 110 Million Global Music Identification Matches
Submitted by grigby1 on Tue, 03/07/2017 - 12:11pm
collection
Content Identification
dataset
fingerprint
genre
geotemporal
mood
music
pubcrawl170201
similarity
test