Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
flow graphs
biblio
CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs
Submitted by grigby1 on Mon, 09/18/2023 - 3:35pm
deep learning
pubcrawl
Human behavior
Metrics
resilience
Resiliency
privacy
process control
flow graphs
malware
Measurement
Task Analysis
graph theory
Malware Analysis
graph neural networks
Resiliency Coordinator
biblio
Countering Malware Via Decoy Processes with Improved Resource Utilization Consistency
Submitted by grigby1 on Fri, 09/04/2020 - 2:16pm
malware
BIOS Security
resource utilization consistency
Probes
heatmap training mechanism
Heating systems
flow graphs
defensive deception
decoy processes
decoy process
control flow graphs
neural network
Human Factors
Scalability
neural nets
Neural networks
learning (artificial intelligence)
Training
resilience
Resiliency
Metrics
pubcrawl
machine learning
resource management
resource allocation
invasive software
biblio
An Approach of Code Pointer Hiding Based on a Resilient Area
Submitted by grigby1 on Mon, 03/23/2020 - 2:58pm
Information systems
source code (software)
Software
security of data
security
Scalability
rop attacks
resilient area
resilience
pubcrawl
pointer hiding
Payloads
memory disclosure vulnerability
Layout
Information Reuse and Security
information system security
Human Factors
Human behavior
flow graphs
Diversity methods
composability
code reuse attack
code reuse
code randomization
code pointer hiding
attack scenario
Resiliency
Compositionality
biblio
Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification
Submitted by aekwall on Mon, 06/10/2019 - 9:15am
routing procedure
multiple malicious nodes
passive attacks
privacy
pubcrawl
reasoning rules
Resiliency
Routing
routing phases
mobile computing
routing security
security
Syslog
telecommunication network routing
telecommunication security
verification
verification phase
active attacks
mobile ad hoc networks
Metrics
Merkle hash tree
MANETs routing
MANETs
MANET Attack Detection
log-based anomalies detection
flow graphs
flow graph
Diagnostics
composability
cognition
central control program
Anomaly Detection
Ad hoc networks
biblio
Formulation of SQL Injection Vulnerability Detection as Grammar Reachability Problem
Submitted by grigby1 on Mon, 01/21/2019 - 11:15am
Access Control
Compositionality
cross-site scripting
flow graphs
Grammar
Human behavior
Metrics
Production
pubcrawl
reachability analysis
Resiliency
SQL injection
static analysis
vulnerabilities detection
vulnerability detection
Web application
biblio
Detection of transformed malwares using permission flow graphs
Submitted by grigby1 on Wed, 06/20/2018 - 11:49am
privacy
malware variants
Measurement
Metrics
mobile computing
nontransformed malware
permission flow graph
permission flow graphs
permission framework
Malware Analysis
pubcrawl
resilience
Resiliency
signature based detection
smart phones
state-of-the-art graph similarity algorithm
transformed malware
vertex level
graph based similarity metrics
Android malware
Androids
attack surface
code level changes
control flow
detection accuracy
feature extraction
flow graphs
Android app
graph theory
Human behavior
Humanoid robots
invasive software
learning (artificial intelligence)
lightweight static Permission Flow Graph based approach
malicious apps
malware
biblio
CVSSA: Cross-Architecture Vulnerability Search in Firmware Based on Support Vector Machine and Attributed Control Flow Graph
Submitted by grigby1 on Tue, 05/01/2018 - 10:38am
function level features
vulnerability function
Training
third-party code bases
SVM
suspicious functions
Support vector machines
support vector machine
Software
security of data
Resiliency
resilience
real-world firmware images
pubcrawl
Microprogramming
Metrics
ACFG
flow graphs
firmware security
firmware
feature extraction
CVSSA
cross-architecture vulnerability search methods
cross-architecture
computer architecture
Computational modeling
composability
bipartite matching
binary firmware
basic-block level features
attributed control flow graph