Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
Robust Early Stage Botnet Detection using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 1:22pm
pubcrawl
invasive software
learning (artificial intelligence)
machine learning classifiers
malware
Metrics
PCA
principal component analysis
Protocols
identity theft
Random Forest
resilience
Resiliency
robust early stage botnet detection
security of data
Servers
Support vector machines
telecommunication security
cyberattacks
Botnet detection
botnet detection techniques
botnets
click fraud
Command and Control Channel (C&C)
composability
Computer crime
computer network security
botnet
Cybersecurity
DDoS
early-stage botnet detection
efficient detection rate
feature extraction
feature selection techniques
fraud
biblio
White-Hat Worm Launcher Based on Deep Learning in Botnet Defense System
Submitted by grigby1 on Tue, 03/09/2021 - 1:21pm
IoT system
worms placement
white-hat worm launcher
white-hat botnets
Training data
Resiliency
resilience
pubcrawl
Metrics
Mathematical model
malware
malicious botnets
learning (artificial intelligence)
BDS
IoT
invasive software
Internet of Things
Grippers
deep learning
Data models
computer network security
computer network performance evaluation
composability
botnets
botnet defense system
botnet
biblio
Analysis of Fileless Malware and its Evasive Behavior
Submitted by grigby1 on Thu, 03/04/2021 - 1:45pm
static and advanced malware analysis
malware threats
Memory Analysis
Metrics
operating systems
Payloads
PowerShell (PS)
pubcrawl
resilience
security
malware
Task Analysis
tools
Trojan horses
white box
White Box Security
Windows Management Instrumentation (WMI)
Windows operating system
Windows Operating System Security
computer viruses
privacy
Predictive Metrics
Human behavior
Resiliency
Advance Volatile Threat
Advance Volatile Threat (AVT)
composability
computer systems
Malware Analysis
different malware
evasion
executable malware
file-based malware
fileless malware
Instruments
internet
invasive software
biblio
A Framework for Collecting and Analysis PE Malware Using Modern Honey Network (MHN)
Submitted by grigby1 on Thu, 03/04/2021 - 1:44pm
PE malware
malware PE file type formats
malware samples
Metrics
modern honey network
operating systems
operating systems (computers)
Payloads
PE file format
malware information
resilience
security
security threat
static analysis techniques
Windows operating system
Windows Operating System Security
windows-based malware
static analysis
malware detection
malware collection technique
Malware Analysis
malware
learning (artificial intelligence)
invasive software
file format information
feature extraction
dynamic analysis techniques
Computers
computer viruses
Resiliency
composability
Human behavior
pubcrawl
biblio
Analysis of USB Based Spying Method Using Arduino and Metasploit Framework in Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 1:44pm
Software
peripheral interfaces
plug and play functionality
powershell
pubcrawl
resilience
Resiliency
reverse shell
reverse shell backdoor
operating systems (computers)
spying attacks
Universal Serial Bus
USB attack
USB device
Webcam
Webcams
Windows Operating System Security
Keyboards
security
Arduino
backdoor reverse shell
composability
computer network security
exploitation
Hardware
invasive software
Windows operating system
malware
Metasploit Framework
Metrics
microcontrollers
microphone device
operating system
operating systems
biblio
HAC-T and Fast Search for Similarity in Security
Submitted by aekwall on Mon, 02/22/2021 - 12:43pm
nearest neighbor search
Trend Locality Sensitive Hashing (TLSH)
tree-based index
tools
threshold based hierarchical agglomerative clustering algorithm
standards
similarity digests
security operations center operators
security of data
security analysts
security
search problems
pubcrawl
Predictive Metrics
nearest neighbour methods
Approximate Nearest Neighbour
Measurement
malware
Indexes
Hierarchical Agglomerative Clustering (HAC)
HAC-T
Fuzzy Hashing
fast nearest neighbor search techniques
Cryptography
computer viruses
clustering technique
Clustering algorithms
clustering
cluster quality
cluster malware
biblio
Detection of XSS in web applications using Machine Learning Classifiers
Submitted by grigby1 on Wed, 02/10/2021 - 12:21pm
Web pages
Cross Site Scripting
random forests
cross-site scripting attack
classifiers
Classified Algorithms
cross-site scripting
Vegetation
Uniform resource locators
feature extraction
JavaScript
malware
Scalability
Resiliency
resilience
Human behavior
pubcrawl
machine learning
biblio
The Detecting Cross-Site Scripting (XSS) Using Machine Learning Methods
Submitted by grigby1 on Wed, 02/10/2021 - 12:20pm
Training
machine learning
pubcrawl
Human behavior
resilience
Resiliency
Scalability
malware
Classification algorithms
Measurement
Task Analysis
cross-site scripting
XSS attack
Cross Site Scripting
biblio
Cryptojacking Detection with CPU Usage Metrics
Submitted by grigby1 on Wed, 02/10/2021 - 12:12pm
machine learning
Monitoring
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Cryptography
malware
Measurement
Web pages
Central Processing Unit
biblio
MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities
Submitted by grigby1 on Wed, 02/10/2021 - 12:12pm
hidden cryptocurrency mining activities
security
Resiliency
resilience
pubcrawl
online front-ends
MiNo
Metrics
malware
malicious mining activities
invasive software
internet
Human behavior
Web Browser Security
Hidden Cryptocurrency Mining
digital currencies
Data mining
cryptojacking
cryptocurrency mining
cryptocurrencies
computer resources
Coinhive
Coin Mining
Chrome Web browser add-on application
cash money
bitcoin
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »