Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

system call analysis

biblio

Visible to the public Android gaming malware detection using system call analysis

Submitted by grigby1 on Tue, 11/17/2020 - 2:40pm
  • Androids
  • Operating systems security
  • system call analysis
  • malware game system calls
  • malicious gaming applications
  • malicious games
  • detection system
  • cloning applications
  • benign game system calls
  • Android operating systems
  • Android gaming malware detection system
  • Android Gaming Malware
  • computer games
  • Android (operating system)
  • Humanoid robots
  • Monitoring
  • resilience
  • Games
  • dynamic analysis
  • program diagnostics
  • invasive software
  • malware
  • Cloning
  • smart phones
  • mobile computing
  • composability
  • Resiliency
  • Metrics
  • pubcrawl
biblio

Visible to the public Detecting mobile botnets through machine learning and system calls analysis

Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
  • malware
  • threat minimization
  • system call analysis
  • statistical feature extraction
  • statistical analysis
  • self-generated dataset
  • Resiliency
  • pubcrawl
  • pattern detection
  • Monitoring
  • Mobile handsets
  • mobile environment
  • mobile computing
  • Mobile communication
  • mobile botnet detection
  • Metrics
  • anomalous behavior identification
  • machine learning algorithms
  • machine learning
  • legitimate application
  • learning (artificial intelligence)
  • invasive software
  • Internet security
  • internet
  • host-based approach
  • feature extraction
  • desktop domain
  • computer network security
  • Compositionality
  • close-to-reality scenario
  • botnets
  • anomaly-based approach

Terms of Use  |  ©2023. CPS-VO