Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
CryingJackpot: Network Flows and Performance Counters against Cryptojacking
Submitted by grigby1 on Wed, 02/10/2021 - 12:11pm
Data mining
performance counters
cryptojacking
network flows
security analytics
Clustering algorithms
clustering
Task Analysis
malware
feature extraction
Intrusion Detection
Cryptography
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Servers
biblio
Advanced Behavior-Based Technique for Cryptojacking Malware Detection
Submitted by grigby1 on Wed, 02/10/2021 - 12:11pm
malware
malicious mining
cryptojacking
behavioral analysis
Multicore processing
Ransomware
Cybercrime
Browsers
malware detection
Monitoring
Libraries
Cryptography
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
biblio
DeepMal: A CNN-LSTM Model for Malware Detection Based on Dynamic Semantic Behaviours
Submitted by aekwall on Mon, 02/08/2021 - 12:41pm
cyber-criminals
recurrent neural nets
Human Factors
LSTM
Compositionality
high-level abstractions
CNN-LSTM model
Cyber Dependencies
component-CNN
convolution
deep learning framework
DeepMal
dynamic semantic behaviours
evil intentions
locally spatial correlations
malicious programs
malware classification task
sequential longterm dependency
Metrics
malware
malware detection
invasive software
Data models
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
Scalability
Neurons
pattern classification
Training
machine learning
convolutional neural nets
natural language processing
NLP techniques
biblio
Preventive Techniques of Phishing Attacks in Networks
Submitted by grigby1 on Wed, 02/03/2021 - 1:02pm
malware
Web sites
spam
social engineering
security threats
Scalability
Resiliency
resilience
pubcrawl
phishing attack preventive techniques
Phishing
online businesses
online applications
network security
Anti-phishing
machine learning
internet
information technology
information security
Human Factors
Human behavior
honey pots
Honey Pot
fake Websites
fake applications
Electronic mail
e-hunting websites
Computer crime
biblio
An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks
Submitted by grigby1 on Wed, 02/03/2021 - 1:01pm
Intrusion Detection
wrapping attacks
Virtual machining
specific honey pot algorithm
Servers
security issues
security
Scalability
Resiliency
resilience
pubcrawl
procedural intrusion way
malware
invasive software
Intrusion Detection Systems
Browser Security
intrusion
Human Factors
Human behavior
honey pots
honey pot attack
Honey pot (computing)
Honey Pot
Flooding Attacks
common security breaches
cloud computing security attacks
Cloud Computing
browser malware-injection attacks
authentication
attacks
biblio
Profiling Vulnerabilities Threatening Dual Persona in Android Framework
Submitted by grigby1 on Thu, 01/28/2021 - 12:31pm
Quadroot
IPC
Kernel
malware
managed profiles
Market research
Metrics
mobile computing
National Vulnerability Database NVD
Pingroot
profiling vulnerabilities threatening dual persona
pubcrawl
inter-process communication
resilience
Resiliency
Scalability
security of data
security threat analysis
smart phones
smartphone
Stagefright
unrestricted access
vulnerable Android versions
certificate forging
Android (operating system)
Android 5
Android for Work
Android Lollipop release
Android platform
Android security model
Android smartphones
Android vulnerabilities
Android vulnerability Website
Androids
BYOP
android encryption
checksum collisions
crafted MMS
CYOD
dual persona
EMM
encryption
FUM score
Google
GSuite
Human behavior
biblio
Session-level Adversary Intent-Driven Cyberattack Simulator
Submitted by grigby1 on Thu, 01/28/2021 - 12:10pm
event-driven simulation model
user access levels
tools
session-level adversary intent-driven cyberattack simulator
Scalability
Resiliency
resilience
request-response session level
pubcrawl
proactive analysis
network infrastructure
Metrics
malware
internet
Human behavior
adversary behavior
Entry points
DEVS
defender
Data models
Cybersecurity
cyberattack
cyber adversary behavior
Bronze Butler APT
authorisation
attackers
APT
Analytical models
Adversary Models
biblio
An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Submitted by grigby1 on Mon, 01/25/2021 - 10:29am
Human behavior
usability
tools
security
resilience
Metrics
malware
machine learning
Human Factors
Security Heuristics
Government
composability
Analytical models
Air gaps
pubcrawl
predictability
Scalability
Resiliency
biblio
A Review of Various Attack Methods on Air-Gapped Systems
Submitted by grigby1 on Mon, 01/25/2021 - 10:28am
Fans
Universal Serial Bus
security breach
Resiliency
resilience
pubcrawl
Metrics
malware
Magnetoacoustic effects
Human Factors
Human behavior
Acoustics
exfiltrate
Electromagnetic radiation
data leak
covert channels
composability
Cameras
attack methods
air-gapped
Air gaps
biblio
CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives
Submitted by grigby1 on Mon, 01/25/2021 - 10:27am
novel acoustic covert channel
Drives
exfiltration
Human behavior
Human Factors
internet
invasive software
loudspeakers
malware
Metrics
nearby Internet connected receiver
digital versatile discs
optical drives
optical modulation
optical receivers
process sensitive information
pubcrawl
resilience
Resiliency
signal generation
smart phones
composability
acoustic signal detection
acoustical characteristics
Acoustics
air gap
Air gaps
air-gapped environment
air-gapped networks
audioless air-gapped computers
CD-LEAK
acoustic
compromised computer
computer network security
computer speakers
Computers
covert acoustic signals
covert channels
data modulation
Demodulation
demodulation algorithms
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »