Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
Machine Learning based Malware Detection in Cloud Environment using Clustering Approach
Submitted by grigby1 on Wed, 05/05/2021 - 11:56am
machine learning
Trend Micro Locality Sensitive Hashing (TLSH)
Training
Solid modeling
Scalability
sandboxing
pubcrawl
Principal Component Analysis (PCA)
policy-based governance
malware detection
malware
cloud
feature extraction
False Positive Rate (FPR)
cuckoo sandbox
Computational modeling
composability
collaboration agreements
collaboration
clustering
Cloud Computing
biblio
JavaScript malware behaviour analysis and detection using sandbox assisted ensemble model
Submitted by grigby1 on Wed, 05/05/2021 - 11:56am
Payloads
Voted Perceptron
Training
tools
Sequential Minimal Optimization
Scalability
sandboxing
sandbox
pubcrawl
policy-based governance
AdaBoost
malware
JavaScript
feature extraction
Computational modeling
composability
collaboration agreements
collaboration
Analytical models
biblio
Optimizing Away JavaScript Obfuscation
Submitted by grigby1 on Wed, 05/05/2021 - 11:43am
Open Source Software
tools
static analysis
Safe Coding
Resiliency
resilience
pubcrawl
policy-based governance
Payloads
collaboration
obfuscation
Metrics
Manuals
malware
JavaScript
internet
Human Factors
Human behavior
biblio
Host-Oriented Approach to Cyber Security for the SCADA Systems
Submitted by grigby1 on Wed, 05/05/2021 - 11:31am
Computers
SCADA Systems Security
SCADA/ICS
DLL injection
Code injection
fileless malware
System software
SCADA System Security
SCADA
Compositionality
malware
machine learning
Computer crime
SCADA systems
process control
cyber security
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Scalable and Accurate Binary Code Search Method Based on Simhash and Partial Trace
Submitted by grigby1 on Wed, 05/05/2021 - 11:21am
Binary Code Search
Binary codes
distortion
Filtering
malware
Malware Homology Analysisi
Partial Trace
pubcrawl
Scalability
Scalable Security
security
simHash
Syntactics
tools
biblio
On Runtime Software Security of TrustZone-M Based IoT Devices
Submitted by aekwall on Mon, 05/03/2021 - 12:06pm
pubcrawl
TrustZone
software security
security
Scalability
Runtime
rop attacks
Resiliency
Random access memory
return oriented programming
Payloads
microcontroller
malware
Internet of Things
Human Factors
encoding
composability
biblio
Using Knowledge Graphs and Reinforcement Learning for Malware Analysis
Submitted by grigby1 on Tue, 04/27/2021 - 1:40pm
Measurement
Semantics
security
Scalability
Resiliency
resilience
Reinforcement learning
pubcrawl
Metrics
Malware Analysis
malware
machine learning algorithms
Knowledge graphs
Cybersecurity
computer security
Big Data
Artificial Intelligence
graph theory
biblio
APTrace: A Responsive System for Agile Enterprise Level Causality Analysis
Submitted by aekwall on Tue, 04/27/2021 - 12:35pm
network security
Scalability
malware
Resiliency
pubcrawl
Phishing
Security Heuristics
predictability
unsolicited e-mail
Backtracking
Backtracking analysis
domain language
Domain Specific Languages
expressiveness
responsiveness
biblio
Dynamic information-theoretic measures for security informatics
Submitted by aekwall on Thu, 04/08/2021 - 3:42pm
instruction sequence
security domain
vehicle dynamics
information theoretic security
activity trace
behavior prediction
dynamic information-theoretic measure
dynamical process analysis
innocent computer network activity
Informatics
legitimate software
malicious computer network activity
Predictive Analytics
security application
Security informatics
social network dynamics
stochastic dynamical system
Social network services
Cryptography
malware
invasive software
cyber security
Resiliency
Human behavior
pubcrawl
policy-based governance
Scalability
social networking (online)
Metrics
social network
natural language processing
information theory
Markov processes
static analysis
biblio
An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network
Submitted by aekwall on Thu, 04/08/2021 - 3:36pm
ransomware behavior
malware
microsoft windows
neural nets
Neural networks
newly found research paradigm
pubcrawl
Ransomware
ransomware attacks
low-level file system
ransomware detection
ransomware families
ransomware researchers
ransomware samples
ransomware samples every day
Resiliency
retail to critical infrastructure
global surge
artificial neural network
Compositionality
Cryptography
cyber-attacks
Data collection
discovering novel ransomware families
driven effective ransomware detection scheme
effective artificial neural network structure
i-o systems security
I/O Monitoring
industry-based security researchers
Information Reuse and Security
invasive software
IRP logs
Kernel
learning (artificial intelligence)
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »