Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ransomware detection
biblio
Ransomware detection using process mining and classification algorithms
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
pattern classification
Resiliency
ransomware detection
ransomware attacks
Ransomware
random forest algorithms
Random Forest
Scalability
pubcrawl
policy-based governance
process model
process mining methods
process mining
Classification algorithms
Metrics
J48
invasive software
Internet users
internet
Human behavior
feature extraction
detection ransomwares
Data mining
cryptology
computing power
composability
biblio
Attention in Recurrent Neural Networks for Ransomware Detection
Submitted by aekwall on Mon, 10/07/2019 - 11:42am
Metrics
Windows environment
user access
Scalability
Resiliency
Recurrent neural networks
recurrent neural nets
ransomware sequences
ransomware executables
ransomware detection
ransomware attacks
Ransomware
pubcrawl
pattern locks
organizational level
Microprocessors
attention mechanisms
malware detection
malicious software
LSTM models
LSTM
Long short-term memory
Logic gates
learning (artificial intelligence)
invasive software
Human behavior
deep learning methods
deep learning
computer security
computer architecture
composability
biblio
Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph
Submitted by grigby1 on Mon, 03/05/2018 - 1:15pm
API CFG (calls flow graph)
composability
Data mining
dynamic analysis
Metrics
pubcrawl
Ransomware
ransomware detection
resilience
Resiliency
biblio
2entFOX: A framework for high survivable ransomwares detection
Submitted by grigby1 on Fri, 11/03/2017 - 11:27am
invasive software
security mechanisms
Security Awareness
Resiliency
ransomwares behaviour
ransomware detection
ransomware attacks
Ransomware
pubcrawl
Metrics
malwares
malware detection
Malware Analysis
malware
2entFOX
Human behavior
HSR
high survivable ransomwares detection
high survivable ransomware
feature extraction
Engines
Cryptography
computer architecture
composability
belief networks
behavioral detection
Bayesian belief network
Bayes methods
biblio
Detecting Ransomware with Honeypot Techniques
Submitted by grigby1 on Fri, 11/03/2017 - 11:27am
Ransomware
malware
malware form
Metrics
Microsoft file server resource manager feature
Monitoring
Network
network administrators
pubcrawl
invasive software
ransomware activity detection
ransomware attacks
ransomware detection
Resiliency
Servers
social engineering methods
Windows security logs
witness tripwire files
Electronic mail
bogus computer resources
composability
computer security
Computers
Cryptography
cyber security
decoy computers
detect
activity
EventSentry
file screening service
file servers
honeypot
honeypot techniques
Human behavior
illicit access detection
« first
‹ previous
1
2