Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ransomware attacks
biblio
Identification of Ransomware families by Analyzing Network Traffic Using Machine Learning Techniques
Submitted by aekwall on Thu, 07/14/2022 - 3:20pm
Classification algorithms
composability
Computer hacking
feature extraction
machine learning
machine learning algorithms
Metrics
network traffic
Protocols
pubcrawl
Ransomware
ransomware attacks
ransomware families
Resiliency
telecommunication traffic
biblio
API-Based Ransomware Detection Using Machine Learning-Based Threat Detection Models
Submitted by aekwall on Thu, 07/14/2022 - 3:20pm
privacy
machine learning
Analytical models
feature extraction
Metrics
Resiliency
composability
Ransomware
ransomware detection
API calls
telecommunication traffic
Nonhomogeneous media
pubcrawl
network traffic
ransomware attacks
ransomware families
biblio
Ransomware Attacks: Risks, Protection and Prevention Measures
Submitted by grigby1 on Tue, 07/12/2022 - 2:11pm
Organizations
pubcrawl
Human behavior
Resiliency
Software
internet
Metrics
Software measurement
resilience
software protection
Ransomware
cryptojacking
Cyber espionage
cybercrime activity
protection system distribution
ransomware attacks
biblio
Manufacturing and Production Sector
Submitted by willirn1 on Tue, 10/26/2021 - 3:09pm
manufacturing
Production
cyber threats
supply chains
C3E
physical threats
malicious human action
ransomware attacks
software supply chain
Industrial Control Systems
networks
biblio
Cyber Resilience and Response
Submitted by willirn1 on Tue, 10/26/2021 - 3:03pm
cyber resilience
Cyber Response
C3E
cyber threat
Cybersecurity
Risk
Supply Chain Attacks
supply chains
malware
NotPetya
Software
distribution
ransomware attacks
Hardware
Vendors
biblio
An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network
Submitted by aekwall on Thu, 04/08/2021 - 3:36pm
ransomware behavior
malware
microsoft windows
neural nets
Neural networks
newly found research paradigm
pubcrawl
Ransomware
ransomware attacks
low-level file system
ransomware detection
ransomware families
ransomware researchers
ransomware samples
ransomware samples every day
Resiliency
retail to critical infrastructure
global surge
artificial neural network
Compositionality
Cryptography
cyber-attacks
Data collection
discovering novel ransomware families
driven effective ransomware detection scheme
effective artificial neural network structure
i-o systems security
I/O Monitoring
industry-based security researchers
Information Reuse and Security
invasive software
IRP logs
Kernel
learning (artificial intelligence)
biblio
A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems
Submitted by aekwall on Mon, 03/23/2020 - 12:26pm
organisational information systems
SSDEEP
threat actors
WannaCryptor
file organisation
codebase
k-means clustering
malware prevention strategy
mvHASH-B
SDHASH
ransomware corpus
ransomware detection method
ransomware samples
similarity detection success rate
similarity preserving hashing
similarity preserving hashing method
unknown ransomware variants
fuzzy set theory
invasive software
Resiliency
pubcrawl
composability
Ransomware
Metrics
organisational aspects
probability
Cryptography
Information systems
pattern clustering
ransomware attacks
WannaCry
Fuzzy Hashing
fuzzy hashing methods
fuzzy similarity scores
biblio
Machine Learning Based Ransomware Detection Using Storage Access Patterns Obtained From Live-forensic Hypervisor
Submitted by aekwall on Mon, 03/23/2020 - 12:25pm
Internet of Things devices
UK National Health Service
storage access patterns
static ransomware analysis
prevention systems
machine learning based ransomware detection
live-forensic hypervisor
live ransomware samples
large-scale cyber attacks
dynamic ransomware analysis
dynamic analysis
benign application
behavioral model
Zero-day attacks
invasive software
ransomware attacks
mobile devices
cloud services
machine learning
Metrics
Ransomware
composability
pubcrawl
Resiliency
learning (artificial intelligence)
cyber-physical systems
support vector machine
Support vector machines
biblio
Ransomware detection using process mining and classification algorithms
Submitted by aekwall on Mon, 03/23/2020 - 12:25pm
pattern classification
Resiliency
ransomware detection
ransomware attacks
Ransomware
random forest algorithms
Random Forest
Scalability
pubcrawl
policy-based governance
process model
process mining methods
process mining
Classification algorithms
Metrics
J48
invasive software
Internet users
internet
Human behavior
feature extraction
detection ransomwares
Data mining
cryptology
computing power
composability
biblio
Attention in Recurrent Neural Networks for Ransomware Detection
Submitted by aekwall on Mon, 10/07/2019 - 10:42am
Metrics
Windows environment
user access
Scalability
Resiliency
Recurrent neural networks
recurrent neural nets
ransomware sequences
ransomware executables
ransomware detection
ransomware attacks
Ransomware
pubcrawl
pattern locks
organizational level
Microprocessors
attention mechanisms
malware detection
malicious software
LSTM models
LSTM
Long short-term memory
Logic gates
learning (artificial intelligence)
invasive software
Human behavior
deep learning methods
deep learning
computer security
computer architecture
composability
1
2
next ›
last »