Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
signature based defense
biblio
Towards an Attack Signature Generation Framework for Intrusion Detection Systems
Submitted by grigby1 on Wed, 05/30/2018 - 4:05pm
security of data
XPath injection
XML
web services
Web Service
web security testing tools
Weapons
tools
SOAP injeciton
Simple object access protocol
signature IDSs
Signaturebased Intrusion Detection Systems
signature based defense
Servers
attacks
Scalability
Resiliency
resilience
pubcrawl
privilege escalation
organizations valuable information resources
Information Leakage
genetic algorithms
deployed web services
attack signatures
attack signature generation framework
attack signature generation approach
biblio
Detecting Periodic Subsequences in Cyber Security Data
Submitted by grigby1 on Wed, 05/30/2018 - 4:05pm
identifyingautomated network events
traditional signature-based detection systems
statistical analysis
signature based defense
Scalability
Resiliency
resilience
pubcrawl
probability models
probability
maximum likelihood estimation
Los Alamos National Laboratory's enterprise computer network
invasive software
Anomaly Detection
digital signatures
data sets
Data models
cyber-security defence
cyber security data
computer networks
computer network security
computer network behaviour
Computational modeling
changepoint detection framework
automated network events
authentication
biblio
Predicting Signatures of Future Malware Variants
Submitted by grigby1 on Wed, 05/30/2018 - 4:05pm
malware detection systems
Vaccines
Training
significant scientific development
signature based defense
security of data
Scalability
Resiliency
resilience
pubcrawl
Predictive models
malware evolution
Clustering algorithms
malware defense
malware
learning (artificial intelligence)
invasive software
History
future malware variants
future malware signatures
future family developments
feature extraction
defensive system
biblio
A Control Flow Graph-Based Signature for Packer Identification
Submitted by grigby1 on Wed, 05/30/2018 - 4:05pm
malware
single signature
signature based defense
Scalability
Resiliency
resilience
Reliability
pubcrawl
packer identification
malware samples
malware detection
malware attacks
Malware Analysis
byte signatures
invasive software
Intel Security Labs
feature extraction
Entropy
Electronic mail
Cryptowall malware
Cryptography
control flow graph
computer security
CFG-based signatures
byte-string signatures
biblio
Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm
Submitted by grigby1 on Wed, 05/30/2018 - 4:04pm
input addresses
signature based defense
Servers
Scalability
ring signature algorithm
ring signature
Resiliency
resilience
Public key
pubcrawl
Protocols
perceived anonymity property
output addresses
mixing service provider
mixing server
anonymity
financial data processing
electronic money
double-spending attack
digital signatures
decentralized digital currency
Cryptographic Protocols
complete transaction history
coin mixing service
coin mixing scheme
coin mixing
central authority
Bitcoin users
Bitcoin protocol
bitcoin
biblio
Deep Neural Networks for Automatic Android Malware Detection
Submitted by grigby1 on Wed, 05/30/2018 - 4:04pm
pubcrawl
resilience
Resiliency
Scalability
signature based defense
biblio
An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods
Submitted by grigby1 on Wed, 05/30/2018 - 4:04pm
botnets
Cybersecurity
Human behavior
Metrics
Nonparametric Bayesian Methods
pubcrawl
resilience
Resiliency
Scalability
signature based defense
spam detection
biblio
Mass Discovery of Android Traffic Imprints Through Instantiated Partial Execution
Submitted by grigby1 on Wed, 05/30/2018 - 4:04pm
ISP
large scale
partial execution
pubcrawl
resilience
Resiliency
Scalability
signature based defense
slicing
traffic signature
biblio
Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks
Submitted by grigby1 on Wed, 05/30/2018 - 4:04pm
anti-virus
attacks
malware
pubcrawl
resilience
Resiliency
Scalability
signature based defense
Signatures
biblio
A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
Metrics
Zero-day attacks
zero-day attack related database
Zero Day Attacks and Defense
unknown zero-day attacks
traditional defense methods
signature based defense
security of data
Resiliency
relational databases
recurrent attack
pubcrawl
Predictive Metrics
online redundant heterogeneous functionally equivalent modules
Zero day attacks
Knowledge Discovery
Intrusion detection and response
honeypot
feedback
executive module pool
distributed computing
cyberspace mimic defense architecture
Cyberspace Mimic Defense
composability
CMD architecture
Anomaly statistics and analysis
defense
« first
‹ previous
1
2
3
4
5
6
next ›
last »