Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware threats
biblio
Analysis of Fileless Malware and its Evasive Behavior
Submitted by grigby1 on Thu, 03/04/2021 - 1:45pm
static and advanced malware analysis
malware threats
Memory Analysis
Metrics
operating systems
Payloads
PowerShell (PS)
pubcrawl
resilience
security
malware
Task Analysis
tools
Trojan horses
white box
White Box Security
Windows Management Instrumentation (WMI)
Windows operating system
Windows Operating System Security
computer viruses
privacy
Predictive Metrics
Human behavior
Resiliency
Advance Volatile Threat
Advance Volatile Threat (AVT)
composability
computer systems
Malware Analysis
different malware
evasion
executable malware
file-based malware
fileless malware
Instruments
internet
invasive software
biblio
Windows Virtualization Architecture For Cyber Threats Detection
Submitted by aekwall on Wed, 01/16/2019 - 1:08pm
Virtual machine monitors
prediction tool
prediction tools development
pubcrawl
Real-time monitoring
Resiliency
Rootkits
static methods
system monitoring
target Windows machines
virtual machine introspection
Microsoft Windows (operating systems)
virtual machines
virtual memory introspection
Virtualization
VMI
Windows operating system
Windows Operating System Security
Windows OS
Windows threat detection
Windows virtualization architecture
Xen hypervisor
machine learning
composability
cyber breaches
cyber threats detection
Cybersecurity
data structures
hidden security issues
invasive software
Kernel
kernel data structures
learning (artificial intelligence)
alert system administrators
machine learning techniques
malicious process behavior
malware
malware detection
malware threats
memory data structure identification
memory forensic analysis
Metrics
microsoft windows
biblio
Mining Malware Command and Control Traces
Submitted by grigby1 on Mon, 03/19/2018 - 12:55pm
Human behavior
telecommunication traffic
security of data
Scalability
Resiliency
resilience
pubcrawl
Payloads
Pattern recognition
pattern classification
Metrics
malware threats
malware detection rates
malware
invasive software
advanced persistent threat
effective anomaly based detection technique
detecting botnets
Data mining
controller commands
control traces
control payloads
control channel
command and control systems
command and control
Classification algorithms
botnet
anomaly based detection
advanced persistent threats