Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
Deep Android Malware Classification with API-Based Feature Graph
Submitted by grigby1 on Fri, 12/11/2020 - 1:33pm
invasive software
structure analysis
Silicon
security
Resiliency
resilience
pubcrawl
privacy
mobile computing
Metrics
Mathematical model
malware class
malware apps
Malware Analysis
malware
Analytical models
Human behavior
hand-refined API-based feature graph
graph theory
Feature Selection
feature extraction
deep learning
CNN-based classifier
application program interfaces
API-based feature graph classification
API features
Android malware classification
Android malware apps
Android malware
Android (operating system)
biblio
AMDroid: Android Malware Detection Using Function Call Graphs
Submitted by grigby1 on Fri, 12/11/2020 - 1:32pm
learning (artificial intelligence)
structural semantic learning
static analysis
smart phones
Semantics
Resiliency
resilience
pubcrawl
privacy
opcode sequences
mobile operating system
mobile internet
Metrics
Malware Analysis
malware
machine learning
AMDroid
Kernel
invasive software
Human behavior
graph theory
graph kernels
function call graphs
function call graph
feature extraction
FCGs
countless malicious applications
application program interfaces
API calls
Android Malware Detection
Android (operating system)
biblio
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
Submitted by grigby1 on Fri, 12/11/2020 - 1:32pm
privacy
invasive software
IoT malware samples
learning (artificial intelligence)
malware
Malware Analysis
malware detection
Metrics
off-the-shelf adversarial attack methods
Internet of Things
pubcrawl
resilience
Resiliency
robust detection tools
security
static analysis
tools
adversarial learning
Human behavior
graph-based IoT malware detection systems
graph theory
graph embedding
graph analysis
generated adversarial sample
GEA approach
feature extraction
deep learning networks
deep learning
craft adversarial IoT software
control flow graph-based features
CFG-based features
benign sample
augmentation method
biblio
Graph Embedding Based Familial Analysis of Android Malware using Unsupervised Learning
Submitted by grigby1 on Fri, 12/11/2020 - 1:32pm
Malware Analysis
Unsupervised Learning
supervised learning
SRA
smart phones
similarity relationships
Semantics
security
Resiliency
resilience
pubcrawl
privacy
pattern clustering
pattern classification
Metrics
malware link network
analytical workload
malware
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding techniques
graph embedding
GefDroid
feature extraction
familial analysis
Face
detection algorithms
application program interfaces
Android malware
biblio
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
Submitted by grigby1 on Fri, 12/11/2020 - 1:31pm
Robustness
Metrics
mobile computing
mobile malware scanning
privacy
program analysis
program diagnostics
pubcrawl
resilience
Resiliency
market-wide malware scanning
semantic features
Semantics
social networking (online)
social-network-based centrality analysis
static analysis
syntax-based features
transformation attacks
zero-day malware including malware samples
graph theory
Android (operating system)
Android malware
Android Malware Detection
API Centrality
fault-tolerant representation
feature extraction
Google-Play app market
graph semantics
Analysis of variance
Human behavior
invasive software
Lightweight feature
lightweight graph-based approach
MalScan
malware
Malware Analysis
Market-wide
biblio
Malware Containment in Cloud
Submitted by grigby1 on Wed, 12/02/2020 - 1:14pm
graph neural networks
Trusted Computing
trust
smart contracts
pubcrawl
protection mechanisms
Privacy-invasive software
malware
invasive software
hyperledger
Human Factors
Human behavior
high risk trust assumptions
graph theory
blockchain
graph analytics
Dominance Frontier
Distributed databases
decentralized malware containment
Cryptography
contracts
containment process
Containment
Computing Theory
cloud computing environments
Cloud Computing
business processes
biblio
Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems
Submitted by grigby1 on Tue, 12/01/2020 - 12:48pm
intrusion detection system
Robustness
Resiliency
resilience
pubcrawl
Probes
Perturbation methods
network security suite
network intrusion detection systems
ML-based IDS
ML models
malware
malicious network traffic
malicious intrusions
adversarial attacks thwarting
IDS
generative adversarial networks
gan
Gallium nitride
feature extraction
computer network security
composability
anomalous traffic
adversary
adversarial perturbations
adversarial ML attack
Adversarial Machine Learning
biblio
Proposed security by IDS-AM in Android system
Submitted by grigby1 on Tue, 12/01/2020 - 12:45pm
intrusion detection system
smart phones
security of data
Resiliency
resilience
Monitoring
mobile systems
mobile environment
mobile computing
mobile agents
malware
malicious behavior
pubcrawl
Intrusion Detection
IDS-AM
IDS
feature extraction
Data mining
composability
attacks
Android system
Android OS
android
biblio
ScriptNet: Neural Static Analysis for Malicious JavaScript Detection
Submitted by aekwall on Mon, 11/30/2020 - 11:03am
LSTM
Internet-scale Computing Security
sequential processing layers
ScriptNet system
Privacy-invasive software
preinformant learning
PIL model
neural static analysis
Neural models
neural malicious JavaScript detection
JavaScript files
Internet-scale processing
discriminative training
computer infection threat vector
policy governance
deep learning model
malware
deep learning
program diagnostics
Java
Vectors
machine learning
Neural networks
neural nets
Metrics
malware detection
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
invasive software
biblio
Graph Mining-based Trust Evaluation Mechanism with Multidimensional Features for Large-scale Heterogeneous Threat Intelligence
Submitted by aekwall on Mon, 11/23/2020 - 10:38am
Data mining
trust-aware threat intelligence sharing platform
trust-aware intelligence architecture model
TISP
intelligence feature extraction
heterogeneous threat intelligence
GTTI
graph mining
cyber threat intelligence sharing platforms
human trust
Human behavior
trust evaluation mechanism
trust evaluation
security of data
Data protection
Databases
standards
graph theory
pubcrawl
feature extraction
Trusted Computing
security
malware
Organizations
IP networks
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
…
next ›
last »