Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
Practical Implementation of APTs on PTP Time Synchronisation Networks
Submitted by grigby1 on Fri, 01/22/2021 - 1:39pm
synchronisation
PTP time synchronisation networks
PTP infrastructure components
PTP
programmable Man-in-the-Middle
programmable injector device
precision time protocol
IEEE 1588
computer clocks
advanced persistent threats
Clocks
Degradation
Synchronization
cyber-attacks
security of data
APT
advanced persistent threat
malware
delays
Protocols
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
security
Cyber-security
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
DeCrypto Pro
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
Long short-term memory
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
cyberattacks
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
Cryptography
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
biblio
Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis
Submitted by aekwall on Mon, 01/18/2021 - 10:25am
optimisation
Fuzzy Cryptography
YARA rule conditions
rule optimisation process
Performance Optimisation
YARA rules
Fuzzy Hashing
fuzzy rules
Fuzzy sets
fuzzy set theory
Fuzzy logic
Malware Analysis
Scalability
pattern matching
optimization
standards
Metrics
Cryptography
Ransomware
pubcrawl
Resiliency
invasive software
malware
biblio
Analysis of the Asymmetrical Relationships between State Actors and APT Threat Groups
Submitted by aekwall on Mon, 01/11/2021 - 12:38pm
Guidelines
International Affairs
Focusing
Entertainment industry
cyber deterrence
Contestability
ATT&ck
Grippers
Deterrence
Scalability
information and communication technology
attribution
Computer hacking
pubcrawl
Human behavior
Resiliency
malware
biblio
Design of Intrusion Prevention System for OT Networks Using Deep Neural Networks
Submitted by aekwall on Mon, 01/11/2021 - 12:36pm
OT Network
intrusion prevention system
invasive software
IPS system
malware
Modbus
network threats
neural nets
Neural networks
operational technology system elements
internet
OT networks
Protocols
pubcrawl
Resiliency
SCADA
SCADA systems
SCADA test bed
Scalability
telecommunication security
deep neural networks
Air gaps
automation industries
automation scenarios
behavior-based intrusion prevention system
computer network security
cyber-attacks
data acquisition
data acquisition systems
Deep Neural Network
SCADA Systems Security
deep packet inspection
DNP3
DoS attack
feature extraction
industrial control
Industries
industry control system
insider attacks
integrated circuits
biblio
Framework for Analyzing the Security of Robot Control Systems
Submitted by grigby1 on Thu, 12/17/2020 - 12:36pm
pubcrawl
vulnerabilities
threats
security system
security of data
security
robots
robotized system
Robotic system
Robot sensing systems
robot operating systems
robot control systems
Resiliency
resilience
Application software
policy-based governance
operating systems
model
mobile robots
malware
Human Factors
Human behavior
group management system
framework
control engineering computing
attacks
attacker
biblio
Malicious URL Linkage Analysis and Common Pattern Discovery
Submitted by grigby1 on Fri, 12/11/2020 - 1:35pm
Malicious URL
website
Web pages
URL
Uniform resource locators
Resiliency
resilience
real enterprise network
pubcrawl
privacy
open-source threat intelligence
Metrics
Malware Analysis
malware
malicious URL linkage analysis
blacklisting
malicious domain names
malicious domain name
malicious destinations
linkage analysis
internet
Industries
Human behavior
graph-based model
graph theory
drive-by download
Crawlers
Couplings
computer network security
business communication
biblio
Applications of Graph Integration to Function Comparison and Malware Classification
Submitted by grigby1 on Fri, 12/11/2020 - 1:34pm
pubcrawl
NET
pagerank
PageRank measure integration vectorization
PageRank vector
pattern classification
Perron vector
PMIV
privacy
probability
probability measure
Metrics
random forests
resilience
Resiliency
set theory
standalone classifier
text analysis
text-only feature space
vanilla random forest
vertex set
hand-engineered functions
abstract syntax tree
classification
code block
decompilation
directed graphs
easy-to-compute glass-box vectorization scheme
feature extraction
function comparison
graph integration
graph theory
.NET files
Human behavior
invasive software
Lebesgue antiderivatives
machine learning
malware
Malware Analysis
malware classification
markov chain
Markov processes
biblio
Multimodal Graph Analysis of Cyber Attacks
Submitted by grigby1 on Fri, 12/11/2020 - 1:34pm
pubcrawl
Metrics
multimodal graph
multimodal graph analysis
multimodal graph approach
multimodal graph nodes
nodes classification
observed cyber events
privacy
Malware Analysis
resilience
Resiliency
security of data
single-modality graphs
strong inter-modal ties
targeted nodes
unclassified regime
cyber-attacks
attack stages
attacker
autonomous systems
Centrality
centrality analysis
community analysis
Computational modeling
Cyber Attacks
Analytical models
cyberattack
cyberattack victims
Data mining
graph theory
Human behavior
IP networks
malware
biblio
Towards Deep Federated Defenses Against Malware in Cloud Ecosystems
Submitted by grigby1 on Fri, 12/11/2020 - 1:33pm
neural nets
machine learning
machine learning models
malware
Malware Analysis
malware containment
malware detection
Malware-Detection-Cloud-Computing-Graph-Neural-Networks-Federated-Learning-Multicloud-Natural-Language-Processing
Metrics
learning (artificial intelligence)
privacy
Privacy Requirements
pubcrawl
resilience
Resiliency
Task Analysis
Training
virtual machines
feature representation
Biological system modeling
Bit error rate
Cloud Computing
cloud computing environments
cloud-specific optimization problems
data privacy
deep federated defenses
feature extraction
attentional sequence models
federated learning
graph neural networks
graph theory
Human behavior
hypergraph learning models
inductive graph
invasive software
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
…
next ›
last »