Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
PE files
biblio
Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense
Submitted by Katie Dey on Mon, 08/06/2018 - 1:23pm
feature manipulations
Windows application programming interface calls
Windows API calls
security regularization term
secure-learning paradigm
SecDefender
portable executable files
PE files
pattern classification
malware detection
malware
learning-based classifier
learning (artificial intelligence)
invasive software
Adversarial Machine Learning
feature extraction
Extraction
EvnAttack
evasion cost
evasion attack model
Evasion Attack and Defense
Data models
Data mining
computer security
Comodo cloud security center
classifier retraining technique
application program interfaces
Cognitive Security
Articles of Interest
Extraction
C3E 2019
biblio
APT Attack Behavior Pattern Mining Using the FP-Growth Algorithm
Submitted by grigby1 on Mon, 03/19/2018 - 1:55pm
host PC security technologies
signature-based intrusion detection systems
Scalability
Resiliency
resilience
pubcrawl
PE files
Pattern Mining
pattern matching
Metrics
malware
Intrusion Detection
Human behavior
advanced persistent threat attacks
FP-growth algorithm
firewalls
digital signatures
Data mining
Conferences
Cancer
APT attack behavior pattern mining
APT attack
application program interfaces
API files
advanced persistent threats
biblio
Empowering convolutional networks for malware classification and analysis
Submitted by grigby1 on Tue, 01/23/2018 - 3:53pm
pattern classification
malware
Malware Analysis
malware analytics
malware classification
malware families
metadata
Metrics
Neural networks
malicious executable detection
PE files
portable executable files
privacy
pubcrawl
Resiliency
statistical analysis
statistical machine learning
Feedforward neural networks
convolutional networks
convolutional neural constructs
Data mining
disassembled malicious binary execution sequences
feature extraction
feature plain vectorization
feedforward neural constructs
feedforward neural nets
Convolutional codes
hierarchical feature extraction
Human behavior
information feature extraction
instruction n-grams convolution
invasive software
learning (artificial intelligence)
malicious executable classification