Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ransomware attacks
biblio
2entFOX: A framework for high survivable ransomwares detection
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
invasive software
security mechanisms
Security Awareness
Resiliency
ransomwares behaviour
ransomware detection
ransomware attacks
Ransomware
pubcrawl
Metrics
malwares
malware detection
Malware Analysis
malware
2entFOX
Human behavior
HSR
high survivable ransomwares detection
high survivable ransomware
feature extraction
Engines
Cryptography
computer architecture
composability
belief networks
behavioral detection
Bayesian belief network
Bayes methods
biblio
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
Intrusion Detection
user file encryption
user data
Resiliency
ransomware behavior analysis
ransomware attacks
Ransomware
pubcrawl
Monitoring
Metrics
malware
invasive software
Intrusion Detection Systems
antivirus
Human behavior
file decryption
Entropy
encryption
early-warning detection system
Data protection
CryptoLock
Cryptography
composability
behavioral analysis
behavior indicators
arrays
biblio
Detecting Ransomware with Honeypot Techniques
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
Ransomware
malware
malware form
Metrics
Microsoft file server resource manager feature
Monitoring
Network
network administrators
pubcrawl
invasive software
ransomware activity detection
ransomware attacks
ransomware detection
Resiliency
Servers
social engineering methods
Windows security logs
witness tripwire files
Electronic mail
bogus computer resources
composability
computer security
Computers
Cryptography
cyber security
decoy computers
detect
activity
EventSentry
file screening service
file servers
honeypot
honeypot techniques
Human behavior
illicit access detection
« first
‹ previous
1
2