Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware samples
biblio
A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data
Submitted by aekwall on Mon, 03/29/2021 - 10:59am
Generative Adversarial Network(GAN)
generative adversarial network
LSTM
Predictive Metrics
machine learning approaches
antivirus companies
common threats
convolutional neural network (CNN)
cyber-security dangers
deep learning-based malware hunting technique
deep learning
Imbalanced
imbalanced training data sets
long short term memory
Long Short Term Memory(LSTM)
multiple class classification problems
Opcode
opcode sequences
oversampling minority classes
Generative Adversarial Learning
pattern classification
malware
invasive software
Data models
machine learning algorithms
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
Computational modeling
Scalability
internet
Training
CNN
convolutional neural nets
convolutional neural network
generative adversarial networks
recurrent neural nets
malware samples
biblio
A Framework for Collecting and Analysis PE Malware Using Modern Honey Network (MHN)
Submitted by grigby1 on Thu, 03/04/2021 - 1:44pm
PE malware
malware PE file type formats
malware samples
Metrics
modern honey network
operating systems
operating systems (computers)
Payloads
PE file format
malware information
resilience
security
security threat
static analysis techniques
Windows operating system
Windows Operating System Security
windows-based malware
static analysis
malware detection
malware collection technique
Malware Analysis
malware
learning (artificial intelligence)
invasive software
file format information
feature extraction
dynamic analysis techniques
Computers
computer viruses
Resiliency
composability
Human behavior
pubcrawl
biblio
Malware Classification Using Machine Learning Algorithms and Tools
Submitted by grigby1 on Thu, 10/29/2020 - 10:10am
malware
tools
Support vector machines
Resiliency
resilience
Random Forest
pubcrawl
privacy
pattern classification
Metrics
matrix algebra
malware samples
malware classification
Classification algorithms
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Human behavior
feature extraction
family classification
emerging malwares
confusion matrix
comparative classification
comparable features
Cohen's Kappa
biblio
Image-Based Unknown Malware Classification with Few-Shot Learning Models
Submitted by grigby1 on Thu, 10/29/2020 - 10:10am
malware types
well-known models
Resiliency
resilience
pubcrawl
Prototypical Networks
proper defense policies
privacy
pattern classification
network system
microsoft malware classification challenge
Microsoft Malware Classification
Metrics
Matching Networks
massive benefit
automatic protection systems
malware samples
malware research
malware datasets
malware classification problems
malware classification
malware attacks
MalImg
machine learning area
learning (artificial intelligence)
invasive software
image-based unknown malware classification
Human behavior
few-shot learning models
few shot learning
biblio
Evolved Similarity Techniques in Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:14am
malware function similarity techniques
Zeus malware
Zeus
Semantics
reverse engineering
Resiliency
Registers
pubcrawl
privacy
Predictive Metrics
Metrics
Manuals
malware similarity
malware samples
Malware Analysis
malware function pairs
malware family
malware evolution
malware authors
malware
invasive software
Human behavior
function call graph
evolved similarity techniques
evolved code
Databases
binary similarity
graph theory
biblio
Evolutionary Computation for Improving Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:13am
program debugging
variable-strength covering arrays
software improvement
malicious code
individual software artifacts
GI-based bug repair
GI-based approach
genetic improvement
automated repair
automated malware analysis
benign software
Genetics
evolutionary computation
malicious software
Predictive Metrics
Servers
malware samples
Malware Analysis
genetic algorithms
software maintenance
privacy
tools
Metrics
pubcrawl
Human behavior
Resiliency
invasive software
security
malware
biblio
A Novel Machine Learning Based Malware Detection and Classification Framework
Submitted by aekwall on Mon, 10/26/2020 - 11:13am
complex malware types
Predictive Metrics
computer systems
Feature Selection
dynamic analysis
feature selection algorithms
machine learning models
classification accuracy
accurate malware detection
analysis report
classification framework
malware samples
fine-grained classification
high detection
malware analysis framework
malware files
minimum computation cost
selection module
signature-based malware detection techniques
system activities
time progresses
Training
invasive software
machine learning algorithms
feature extraction
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
pattern classification
malware
machine learning
testing
privacy
Virtual machining
Malware Analysis
cuckoo sandbox
malware classification
malware detection
static and dynamic analysis
biblio
Dynamic malware analysis of phishing emails
Submitted by aekwall on Mon, 06/24/2019 - 1:41pm
potentially new malwares
Malware Analysis
malware authors
malware samples
Metrics
network communication
operating system
Phishing
phishing emails
malware
pubcrawl
Resiliency
Servers
Signature Generation
SPIM messages
standard analysis methodology
system monitoring
tools
digital signatures
anomaly signature
anti-malware
anti-virus products
automatic generation
complete dynamic analysis laboratory setting
comprehensive dynamic analysis
Computer crime
computer viruses
active signature
dynamic analysis laboratory setting
Dynamic Malware Analysis
Electronic mail
honeynet
Human behavior
internet
invasive software
biblio
A Control Flow Graph-Based Signature for Packer Identification
Submitted by grigby1 on Wed, 05/30/2018 - 3:05pm
malware
single signature
signature based defense
Scalability
Resiliency
resilience
Reliability
pubcrawl
packer identification
malware samples
malware detection
malware attacks
Malware Analysis
byte signatures
invasive software
Intel Security Labs
feature extraction
Entropy
Electronic mail
Cryptowall malware
Cryptography
control flow graph
computer security
CFG-based signatures
byte-string signatures
biblio
Dynamic Malware Detection Using API Similarity
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
malware
user-confidential information
Trojans
Trojan horses
trojan
tools
Sea measurements
Resiliency
resilience
pubcrawl
pattern matching
malware-detection method
malware samples
Malware Analysis
API
invasive software
information security
Hacker
feature extraction
dynamic Malware detection method
Data mining
credit card details
credit card
Computer crime
Compositionality
application program interfaces
APIs
API similarity