Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
behavioral analysis
biblio
Advanced Behavior-Based Technique for Cryptojacking Malware Detection
Submitted by grigby1 on Wed, 02/10/2021 - 1:11pm
malware
malicious mining
cryptojacking
behavioral analysis
Multicore processing
Ransomware
Cybercrime
Browsers
malware detection
Monitoring
Libraries
Cryptography
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
biblio
Behavior-Based Detection of Cryptojacking Malware
Submitted by grigby1 on Wed, 02/10/2021 - 1:10pm
behavioral analysis
virtual machine environment
malicious mining
illegitimate profit
executable-type cryptojacking
detection program
decision tree algorithm
cybercriminals
cryptojacking malware
Cryptojacking detection
cryptojacking
CPU load
complex detection technique
browser-based cryptojacking
Data mining
behavior-based detection
Ransomware
Cybercrime
Decision trees
invasive software
Computer crime
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
biblio
Behavioral malware analysis algorithm comparison
Submitted by aekwall on Mon, 10/26/2020 - 12:12pm
tools
behavioral malware analysis
Sensitivity
Predictive Metrics
behavioral analysis
computer viruses
Malware Analysis
privacy
testing
computer security
Prediction algorithms
malware
Metrics
Algorithms
pubcrawl
Human behavior
Resiliency
machine learning
learning (artificial intelligence)
machine learning algorithms
malware detection
biblio
Towards a data-driven behavioral approach to prediction of insider-threat
Submitted by aekwall on Wed, 05/08/2019 - 9:47am
Linguistics
Task Analysis
security of data
resilience
pubcrawl
psychology
post-hoc personality analysis
personality vulnerabilities
personality variables
personality differences
Particle measurements
Organizations
Metrics
Atmospheric measurements
learning (artificial intelligence)
insider-threat related behavior
Insider Threats
Insider Threat Detection
insider threat
industrial property
Human behavior
Games
Game-based Approach
data-driven behavioral approach
behavioral analysis
biblio
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
Submitted by grigby1 on Fri, 11/03/2017 - 11:27am
Intrusion Detection
user file encryption
user data
Resiliency
ransomware behavior analysis
ransomware attacks
Ransomware
pubcrawl
Monitoring
Metrics
malware
invasive software
Intrusion Detection Systems
antivirus
Human behavior
file decryption
Entropy
encryption
early-warning detection system
Data protection
CryptoLock
Cryptography
composability
behavioral analysis
behavior indicators
arrays