Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
OS
biblio
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning
Submitted by grigby1 on Fri, 04/17/2020 - 10:28am
system monitoring
OS kernel
OS resource management
pubcrawl
Registers
resilience
Resiliency
rootkit
run-time features
security of data
OS
target kernel module
TF-IDF method
user-mode rootkit detection
Virtual machine monitors
virtual machines
virtualisation
Virtualization
windows kernel rootkits
Windows Operating System Security
kernel space
feature extraction
Hardware
hardware assisted virtualization technology
invasive software
Kernel
kernel rootkit
kernel rootkit detection approach
kernel rootkit detection solution
kernel rootkit detection system
composability
learning (artificial intelligence)
machine learning
machine learning techniques
malicious kernel module
Metrics
operating system
operating system kernels
operating systems (computers)
biblio
A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use
Submitted by grigby1 on Mon, 11/04/2019 - 11:34am
ROP Defense
programming
pubcrawl
Randomization
Registers
resilience
return-oriented programming
return-oriented programming attack
rop attacks
OS
Scalability
security mechanisms
security of data
Software
software watermarking
Steganography
Watermarking
defense mechanisms
Compositionality
Resiliency
Benign Use of ROP
code integrity verification
code reuse attack
composability
computer security
Control Flow Integrity
Information Reuse and Security
extended ROP attack
frequency control
Human behavior
Human Factors
Layout
operating system
operating systems (computers)
biblio
Provable security analysis of complex or smart computer systems in the smart grid
Submitted by grigby1 on Wed, 02/21/2018 - 12:50pm
smart computer systems
power engineering computing
power system security
provable security analysis
pubcrawl
Radiation detectors
resilience
Resiliency
Scalability
security of data
simple promela interpreter
Ports (Computers)
Smart Grid
smart grid security
smart power grids
smart system
SPIN
Temporal Logic
temporal logics
Transition System
TS
Formal Specification
access control mechanism
ACM
authorisation
automata
automata theory
Büchi Automaton
computer security
formal security
formal security analysis
provable security
formal verification
FSA
Linear Temporal Logics
LTL
Mathematical model
Metrics
model checking
operating system
OS
biblio
AVAMAT: AntiVirus and malware analysis tool
Submitted by grigby1 on Tue, 01/23/2018 - 2:52pm
MetaDefender
VirusTotal
security tool
security assessment
Resiliency
pubcrawl
privacy
OS
operating systems (computers)
operating system platforms
Metrics
AntiVirus products
malware detection capabilities
Malware Analysis
Iron
invasive software
Human behavior
Erbium
AVAMAT
AV
antivirus-and-malware analysis tool
antivirus software