Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threat actors
biblio
NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports
Submitted by grigby1 on Fri, 08/28/2020 - 11:23am
Metrics
Training
threat intelligence reports
threat intelligence
threat actors
text representation algorithm
text analysis
Text
Task Analysis
security literature
security analytics
security
pubcrawl
NLP
natural language processing
Information Reuse and Security
malware
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Human behavior
feature extraction
composability
classification
attribution
attack attribution
Resiliency
Compositionality
biblio
A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems
Submitted by aekwall on Mon, 03/23/2020 - 12:26pm
organisational information systems
SSDEEP
threat actors
WannaCryptor
file organisation
codebase
k-means clustering
malware prevention strategy
mvHASH-B
SDHASH
ransomware corpus
ransomware detection method
ransomware samples
similarity detection success rate
similarity preserving hashing
similarity preserving hashing method
unknown ransomware variants
fuzzy set theory
invasive software
Resiliency
pubcrawl
composability
Ransomware
Metrics
organisational aspects
probability
Cryptography
Information systems
pattern clustering
ransomware attacks
WannaCry
Fuzzy Hashing
fuzzy hashing methods
fuzzy similarity scores
biblio
Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors Using Fuzzy Hashing and Fuzzy C-Means Clustering
Submitted by grigby1 on Wed, 02/26/2020 - 3:41pm
signature based defense
fuzzy techniques
Indexes
Locky
malicious code writing
Measurement
pattern clustering
privacy
pubcrawl
Ransomware
ransomware threat actor
SDHASH
fuzzy similarity scores
Similarity Preserving
SSDEEP
successful attack vectors
threat actors
threat vectors
Triaging
unknown ransomware
unlimited polymorphic samples
WannaCry
WannaCryptor
Writing
Cryptography
Resiliency
Metrics
Fuzzy Cryptography
Attack Surfaces
c-means clustering
Cerber
cluster ransomware samples
clustering methods
clustering techniques
composability
Context-Triggered Piecewise Hashing
Scalability
CryptoWall
CTPH
cyberthreat hunting
efficient fuzzy analysis approach
FCM
FCM clustering results
fuzzy c-means clustering
Fuzzy Hashing
fuzzy hashing methods
fuzzy set theory
biblio
Acquiring Cyber Threat Intelligence through Security Information Correlation
Submitted by grigby1 on Tue, 02/06/2018 - 1:07pm
reputation damage
highly sophisticated cyber attacks
incident handling
intellectual property theft
Joining processes
knowledge acquisition
malware
Measurement
Metrics
multistage cyber-physical attack campaigns
pubcrawl
health risk
Resiliency
safety risk
security information correlation
security of data
security operation centers
shutdowns
situational awareness
SoC
threat actors
cyber physical systems
APT
attack countermeasures
attack effect mitigation
CAESAIR
composability
computer security
Correlation
CPS
critical infrastructures
advanced persistent threats
cyber situational awareness
cyber threat intelligence acquisition
cyber threat intelligence analysis engine
cyber-physical systems
daily business operations
data analysis
equipment damage
Europe
financial loss