Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
Malware Subspecies Detection Method by Suffix Arrays and Machine Learning
Submitted by grigby1 on Mon, 02/07/2022 - 3:46pm
privacy
feature extraction
machine learning
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
information security
static analysis
malware
malware detection
virtual environments
Malware Analysis
pattern matching
biblio
Detection of Malware using Machine Learning based on Operation Code Frequency
Submitted by grigby1 on Mon, 02/07/2022 - 3:46pm
Resiliency
Opcode Frequency
metamorphic malware
naive Bayes methods
Malware Analysis
Frequency conversion
malware detection
malware
Conferences
privacy
resilience
Metrics
Human behavior
pubcrawl
machine learning
machine learning algorithms
Predictive models
Training
biblio
Analysis of Data Transforming Technology for Malware Detection
Submitted by grigby1 on Mon, 02/07/2022 - 3:45pm
malware
malicious script
GBM
detection rate
data conversion
Malware Analysis
learning (artificial intelligence)
software engineering
Training data
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
machine learning
deep learning
biblio
Graph-Based Malware Detection Using Opcode Sequences
Submitted by grigby1 on Mon, 02/07/2022 - 3:45pm
Histograms
Malware Analysis and Graph Theory
privacy
Predictive Metrics
Human behavior
Resiliency
encryption
feature extraction
graph-based detection
Hardware
static analysis
Image edge detection
malware
Malware Analysis
malware detection
Metrics
opcode analysis
Packed Malware
pubcrawl
resilience
biblio
Clustering Analysis of Email Malware Campaigns
Submitted by grigby1 on Mon, 02/07/2022 - 3:44pm
malware
Malware labeling
malware feature extraction
email campaigns
clustering analysis
Malware Analysis
Labeling
Task Analysis
Dynamic scheduling
tools
Data mining
Resiliency
resilience
Metrics
Human behavior
pubcrawl
feature extraction
privacy
biblio
EntropLyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics
Submitted by grigby1 on Mon, 02/07/2022 - 3:43pm
Big Data
malware characterization
entropy analysis
Android malware
Malware Analysis
malware classification
automation
data analysis
malware behavior
malware
privacy
Entropy
data privacy
batteries
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Automatic Generation of Different Malware
Submitted by grigby1 on Mon, 02/07/2022 - 3:43pm
Payloads
mobil malware
malware static analysis
malware dynamic analysis
automated malware generation
software development management
Malware Analysis
malware dataset
sockets
malware
privacy
static analysis
programming
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Pay Attention: Improving Classification of PE Malware Using Attention Mechanisms Based on System Call Analysis
Submitted by grigby1 on Mon, 02/07/2022 - 3:42pm
privacy
Predictive Metrics
malware classification
Human behavior
machine learning algorithms
malware
Malware Analysis
Metrics
Neural networks
Prediction algorithms
pubcrawl
resilience
Resiliency
static analysis
Training
Transformers
biblio
Programmable Data Planes as the Next Frontier for Networked Robotics Security: A ROS Use Case
Submitted by grigby1 on Thu, 02/03/2022 - 3:08pm
Protocols
robot operating systems security
in-network computing
P4
Human Factors
ROS
Writing
operating systems
malware
collaboration
robots
Resiliency
resilience
policy-based governance
pubcrawl
security
Computer hacking
biblio
Infrastructure eXpression for Codified Cyber Attack Surfaces and Automated Applicability
Submitted by grigby1 on Tue, 01/11/2022 - 9:35am
Metrics
supply chains
Supply-chain protection
substation automation
standards
software bill of materials
Scalability
Resiliency
resilience
research and development
pubcrawl
Power system protection
attack surface
malware
Infrastructure
Information systems
Hardware bill of materials
Hardware
cyber-physical systems
critical infrastructure
control systems
Bills of materials
Automating cyber response
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »