Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
performance counters
biblio
Multi-Granularity Control Flow Anomaly Detection with Hardware Counters
Submitted by grigby1 on Fri, 02/04/2022 - 1:50pm
Hardware Security
Two-Level Predictor
Time factors
Return Oriented Programming (ROP)
return oriented programming
Resource Efficient
resilience
programming
Program processors
PMU
performance counters
microarchitecture
machine learning
rop attacks
Hardware
embedded systems
embedded security
Dynamic Control Flow Integrity
Buffer overflows
buffer overflow
Human Factors
composability
Scalability
Resiliency
pubcrawl
biblio
CryingJackpot: Network Flows and Performance Counters against Cryptojacking
Submitted by grigby1 on Wed, 02/10/2021 - 12:11pm
Data mining
performance counters
cryptojacking
network flows
security analytics
Clustering algorithms
clustering
Task Analysis
malware
feature extraction
Intrusion Detection
Cryptography
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Servers
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
DeCrypto Pro
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
Long short-term memory
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
cyberattacks
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
Cryptography
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
biblio
ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks
Submitted by grigby1 on Tue, 09/05/2017 - 12:45pm
bit-plru
CLFLUSH
Compositionality
disturbance errors
DRAM
intel pebs
kernel module
Network Security Architecture
performance counters
pubcrawl
Resiliency
rowhammer
signal processing security