Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
Trusted Boot for Embedded Systems Using Hypothesis Testing Benchmark
Submitted by grigby1 on Mon, 03/29/2021 - 11:02am
Metrics
Trusted Computing
trusted boot
Time measurement
security of data
security
Resiliency
resilience
pubcrawl
Benchmark testing
measurement uncertainty
malware
hypothesis testing benchmark
Hardware
embedded systems
Embedded System
composability
boot sequence
biblio
A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data
Submitted by aekwall on Mon, 03/29/2021 - 10:59am
Generative Adversarial Network(GAN)
generative adversarial network
LSTM
Predictive Metrics
machine learning approaches
antivirus companies
common threats
convolutional neural network (CNN)
cyber-security dangers
deep learning-based malware hunting technique
deep learning
Imbalanced
imbalanced training data sets
long short term memory
Long Short Term Memory(LSTM)
multiple class classification problems
Opcode
opcode sequences
oversampling minority classes
Generative Adversarial Learning
pattern classification
malware
invasive software
Data models
machine learning algorithms
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
Computational modeling
Scalability
internet
Training
CNN
convolutional neural nets
convolutional neural network
generative adversarial networks
recurrent neural nets
malware samples
biblio
Polymorphic Adversarial DDoS attack on IDS using GAN
Submitted by aekwall on Mon, 03/29/2021 - 10:57am
adversarial data
Intrusion Detection
Generators
generative adversarial networks
Predictive Metrics
Malicious Traffic
Intrusion Detection Systems
gan
adversarial attacks
natural language processing
adversarial DDoS attacks
Attack Profile
defensive systems
generative adversarial networks (GAN)
polymorphic Adversarial DDoS attack
unknown types
Generative Adversarial Learning
security of data
Training
incremental learning
machine learning
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
DDoS Attacks
machine learning algorithms
Data models
malware
telecommunication security
Scalability
IDS
computer network security
biblio
Analysing Android App Privacy Using Classification Algorithm
Submitted by aekwall on Mon, 03/22/2021 - 12:09pm
privateer
delicate individual information
gadget
Google Play necessities
helpful data
interesting authorization
material security
pertinent segments
pertinent sentences
Play Store
Cellular phones
protection arrangement
security ramifications
security-related dangers
sensitive information territory
shrewd authorizations
subjective utility
unsafe applications
unwavering quality
classification algorithm
authorization
data privacy
malware
mobile computing
Resiliency
pubcrawl
smart phones
software engineering
security of data
expandability
Android (operating system)
Compositionality
Android application
Androids
Humanoid robots
analysing android app privacy
authorizations posting
biblio
IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware
Submitted by grigby1 on Mon, 03/15/2021 - 12:11pm
IoTC-MAL
vulnerabilities
virtualisation
virtual environment
video surveillance
Servers
Resiliency
resilience
pubcrawl
network-connected devices
Metrics
malware
malicious samples
low-interactive IoT honeypots
IoTCMal
authentication
IoT device
IoT
invasive software
Internet of Things
hybrid IoT honeypot
honeypot
homology analysis
Computer hacking
composability
command injection attacks
Bridges
authorisation
authentication services
biblio
A Conceptual Direction on Automatically Evolving Computer Malware using Genetic and Evolutionary Algorithms
Submitted by grigby1 on Tue, 03/09/2021 - 2:06pm
genetic algorithms
security
Scalability
Resiliency
resilience
pubcrawl
Proactive Defence
Metrics
malware creation
malware
Mal-ware Analysis
invasive software
internet
Human behavior
artificial ecosystem
evolutionary computing
evolutionary computation
Evolutionary algorithms
cyber world
cyber security
computing devices
computer malware
co-evolutionary predator-prey framework
BIOS
biologically inspired computing
Bio-inspired computing
artificial world
biblio
The Making of Indicator of Compromise using Malware Reverse Engineering Techniques
Submitted by grigby1 on Tue, 03/09/2021 - 2:05pm
Metrics
tools
static analysis
Software
security
Scalability
reverse engineering
resilience
pubcrawl
Packed Malware
Malware Analysis
Malware Threat
malware
indicators of compromise
computer architecture
BIOS
Resiliency
Human behavior
Predictive Metrics
privacy
biblio
IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 1:25pm
Resiliency
machine learning
machine learning algorithms
malware
malware attack
Metrics
network traffic
packet traffic
pubcrawl
resilience
learning (artificial intelligence)
scikit-learn
Scikit-learn analysis tools machine learning
Scikit-learn machine learning
telecommunication traffic
Time measurement
tools
WEKA
weka tool
false positive rate
botmaster
botnet
botnet IoT
botnet malware attacks
botnets
classification
composability
computer network security
Decision trees
accurate classification methods
inconspicuousness characteristics
inexpensive power
internet network security
Internet of Things
Internet of Things network infrastructure
invasive software
IoT botnet malware classification
IoT devices
biblio
AI-Powered Honeypots for Enhanced IoT Botnet Detection
Submitted by grigby1 on Tue, 03/09/2021 - 1:24pm
potential botnet existence
IoT network
learning (artificial intelligence)
malicious activities
malicious software
malware
malware spread
Metrics
MITM
novel hybrid Artificial Intelligence-powered honeynet
IoT
pubcrawl
resilience
Resiliency
revolutionary expandable network
security
security gaps
Servers
upcoming security mechanism
connected devices
botnet
botnets
Cloud Computing
composability
compromised devices
Computer crime
Computer hacking
computer network security
AI-powered honeypots
conventional security architectures
DDoS
denial-of-service attack
enhanced IoT botnet detection rate
hackers
honeypots
Internet of Things
invasive software
biblio
Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots
Submitted by grigby1 on Tue, 03/09/2021 - 1:23pm
IoT Botnets
time 40.0 d
Strain
Servers
Resiliency
resilience
pubcrawl
password
near-identical malicious login sessions
multiple botnet deployments
mirai
Metrics
medium interaction honeypots
malware
malicious sessions
analyzing variation
invasive software
Internet of Things
honeypot configuration
honeypot
dominant botnet software
Cowrie
computer network security
Computer crime
composability
common attack patterns
Cats
botnets
botnet malware strains
botnet
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »