Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

Trojans

biblio

Visible to the public Phishing Attacks and Protection Against Them

Submitted by grigby1 on Tue, 07/12/2022 - 3:10pm
  • Phishing
  • Trojans
  • malicious PDF-files
  • bankers
  • cryptojacking
  • Ransomware
  • Writing
  • social engineering
  • Electronic mail
  • pubcrawl
  • password
  • resilience
  • Metrics
  • Trojan horses
  • Software
  • Resiliency
  • Human behavior
biblio

Visible to the public Cyber Security at a Glance

Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
  • Sniffing
  • data records
  • DDoS and DOS attacks
  • DDoS Attack
  • distributed denial-of-service attack
  • firewall
  • hacking techniques
  • man in the middle attack
  • polymorphic virus
  • proxy
  • computer malwares
  • social engineering
  • spoofing
  • Tor browser
  • trojan
  • Trojan horses
  • Trojans
  • vpn
  • Worm
  • BIOS Security
  • Human Factors
  • Computer crime
  • Firewalls (computing)
  • internet
  • pubcrawl
  • Metrics
  • Resiliency
  • resilience
  • cyber security
  • malware
  • Scalability
  • Cyber Attacks
  • Computer hacking
  • denial-of-service attack
  • computer viruses
  • antivirus
  • BeEF
  • boot sector virus
  • Brute forcing
biblio

Visible to the public Dynamic Malware Detection Using API Similarity

Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
  • malware
  • user-confidential information
  • Trojans
  • Trojan horses
  • trojan
  • tools
  • Sea measurements
  • Resiliency
  • resilience
  • pubcrawl
  • pattern matching
  • malware-detection method
  • malware samples
  • Malware Analysis
  • API
  • invasive software
  • information security
  • Hacker
  • feature extraction
  • dynamic Malware detection method
  • Data mining
  • credit card details
  • credit card
  • Computer crime
  • Compositionality
  • application program interfaces
  • APIs
  • API similarity

Terms of Use  |  ©2023. CPS-VO