Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

graph-generation

biblio

Visible to the public Optimizing Detection of Malware Attacks through Graph-Based Approach

Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
  • Metrics
  • hook attacks
  • Host-based
  • invasive software
  • Kernel
  • malicious code execution
  • malicious system call
  • malware
  • malware attacks
  • Graph-model
  • Monitoring
  • optimisation
  • optimization
  • pubcrawl
  • resilience
  • Resiliency
  • signature-based model
  • tools
  • computer viruses
  • API hook
  • application program interfaces
  • application programming interface
  • attack graphs
  • code obfuscation technique
  • communication technology
  • composability
  • Computational modeling
  • API graph-based model
  • Computers
  • digital signatures
  • graph comparison
  • graph partition
  • graph theory
  • graph-based approach
  • graph-generation

Terms of Use  |  ©2023. CPS-VO