Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware families
biblio
Text Mining for Malware Classification Using Multivariate All Repeated Patterns Detection
Submitted by grigby1 on Thu, 10/29/2020 - 10:12am
privacy
Metrics
mobile computing
mobile devices
Mobile handsets
mobile phones
mobile users
multivariate all repeated pattern detection
Payloads
malware family classification
pubcrawl
randomly selected malware applications
resilience
Resiliency
smart phones
smartphone users
Social network services
Text Mining
invasive software
Androids
ARPaD
bank accounts
cyber criminals
Data mining
Human behavior
Humanoid robots
internet
Android Malware Detection
legitimate application
LERP-RSA
malware
malware classification
malware dataset
malware detection
malware families
biblio
MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware
Submitted by grigby1 on Fri, 08/14/2020 - 10:44am
orthogonal defense
global malware operations
law enforcement agencies
MALPITY
malware authors
malware families
malware spreading
malware tarpits
monetization techniques
command and control systems
POSIX
Sinkholing
Socket API
Tarpit
tarpit vulnerabilities
Unix
Winsock socket APIs
application programming interface
Dynamic Malware Analysis
Servers
pubcrawl
resilience
Resiliency
malware
invasive software
APIs
application program interfaces
Engines
Compositionality
network service
network operation
botnet
sockets
Grippers
botnet infrastructures
botnets
biblio
Defending IT Systems against Intelligent Malware
Submitted by grigby1 on Mon, 06/10/2019 - 1:02pm
privacy
malware binaries
malware classification
malware detection
malware families
malware images
malware variants
Metrics
neural nets
Malware Analysis
pubcrawl
resilience
Resiliency
Signatures
static analysis
Training
unsupervised deep neural networks
adversarial examples
malware
machine learning algorithms
machine learning
learning (artificial intelligence)
IT systems
invasive software
intelligent malware
Human behavior
generative adversarial networks
generative adversarial network
Gallium nitride
dynamic analysis
Classification algorithms
ART
Antivirus Software vendors
biblio
Empowering convolutional networks for malware classification and analysis
Submitted by grigby1 on Tue, 01/23/2018 - 2:53pm
pattern classification
malware
Malware Analysis
malware analytics
malware classification
malware families
metadata
Metrics
Neural networks
malicious executable detection
PE files
portable executable files
privacy
pubcrawl
Resiliency
statistical analysis
statistical machine learning
Feedforward neural networks
convolutional networks
convolutional neural constructs
Data mining
disassembled malicious binary execution sequences
feature extraction
feature plain vectorization
feedforward neural constructs
feedforward neural nets
Convolutional codes
hierarchical feature extraction
Human behavior
information feature extraction
instruction n-grams convolution
invasive software
learning (artificial intelligence)
malicious executable classification