Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph analysis
biblio
Adversarial Attack and Defense on Graph-based IoT Botnet Detection Approach
Submitted by aekwall on Mon, 01/10/2022 - 12:49pm
Classification algorithms
Malware Analysis and Graph Theory
privacy
Predictive Metrics
Human behavior
Resiliency
adversarial attack
attack graphs
botnet
Training
composability
Computational modeling
graph analysis
IoT Botnet detection
malware
pubcrawl
Reinforcement learning
supervised learning
biblio
On the Network and Topological Analyses of Legal Documents Using Text Mining Approach
Submitted by grigby1 on Mon, 11/29/2021 - 3:31pm
Big Data
composability
Computational modeling
Document Mining
graph analysis
Graph Clustering
Human behavior
Human Factors
Law
Metrics
network science
pubcrawl
Scalability
text analysis
text analytics
Text Mining
biblio
A Semi-Supervised Learning Scheme to Detect Unknown DGA Domain Names Based on Graph Analysis
Submitted by grigby1 on Tue, 09/21/2021 - 3:51pm
Metrics
supervised learning
Semisupervised learning
security
reverse engineering
Resiliency
resilience
pubcrawl
privacy
Prediction algorithms
botnet
Malware Analysis
malware
machine learning
Human behavior
graph theory
graph analysis
feature extraction
DGA
biblio
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
privacy
invasive software
IoT malware samples
learning (artificial intelligence)
malware
Malware Analysis
malware detection
Metrics
off-the-shelf adversarial attack methods
Internet of Things
pubcrawl
resilience
Resiliency
robust detection tools
security
static analysis
tools
adversarial learning
Human behavior
graph-based IoT malware detection systems
graph theory
graph embedding
graph analysis
generated adversarial sample
GEA approach
feature extraction
deep learning networks
deep learning
craft adversarial IoT software
control flow graph-based features
CFG-based features
benign sample
augmentation method
biblio
ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures
Submitted by grigby1 on Mon, 06/10/2019 - 1:58pm
android
Correlation
Cyber-Infrastructure
graph analysis
graph theory
Human behavior
malware
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
biblio
Context-aware graph-based analysis for detecting anomalous activities
Submitted by grigby1 on Tue, 12/12/2017 - 1:24pm
pubcrawl
Insider Threats
maximum flow algorithm
Metrics
multimodal resources
optimisation
optimization
Organizations
policy-based governance
insider threat
query-adaptive graph-based optimization approach
Reliability
Resiliency
Support vector machines
time-dependent data
ubiquitous computing
user model mutual similarity
user profile analysis
context-dependent anomaly type
anomalous activity detection
anomalous user activity identification
Anomaly Detection
anomaly localization
anomaly occurrence
collaboration
Complexity theory
context-aware graph-based analysis
Activity Recognition
data analysis
Electronic mail
exhaustive identification
gesture recognition
graph analysis
graph theory
Human behavior
Human Factors
biblio
Collaborative botnet detection with partial communication graph information
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
Internet of Things
universal communication graph
Resiliency
pubcrawl
Peer-to-peer computing
peer-to-peer botnets
partial information
partial communication graph information
P2P networks
P2P botnets
Metrics
machine learning techniques
invasive software
Internet-of-Things devices
Algorithm design and analysis
Image edge detection
graph theory
graph analysis
Error analysis
detection errors
detection algorithms
computer network security
Computer crime
Compositionality
community detection algorithms
collaborative botnet detection
centralized command & control structure botnets
botnets