Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 1:41pm
OWASP
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
information confidentiality
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
software engineering
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
security of data
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
biblio
Android gaming malware detection using system call analysis
Submitted by grigby1 on Tue, 11/17/2020 - 1:40pm
Androids
Operating systems security
system call analysis
malware game system calls
malicious gaming applications
malicious games
detection system
cloning applications
benign game system calls
Android operating systems
Android gaming malware detection system
Android Gaming Malware
computer games
Android (operating system)
Humanoid robots
Monitoring
resilience
Games
dynamic analysis
program diagnostics
invasive software
malware
Cloning
smart phones
mobile computing
composability
Resiliency
Metrics
pubcrawl
biblio
Utilizing Netflow Data to Detect Slow Read Attacks
Submitted by aekwall on Mon, 11/09/2020 - 12:14pm
machine learners
application layer DDoS attacks
application servers
classifiers
IP Flow Information Export standard
IPFIX
IPFIX standard
legitimate network requests
low volume attack methods
open systems
NetFlow
Netflow data
network security solutions
SiLK
Slow Read
slow read attack detection models
slow read DDoS attacks
Information Reuse and Security
pubcrawl
Computer crime
computer network security
false alarm rate
IP networks
Protocols
invasive software
learning (artificial intelligence)
Resiliency
distributed denial of service
internet
tools
computer networks
file servers
Web servers
Compositionality
malware
memory resources
biblio
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning
Submitted by grigby1 on Wed, 11/04/2020 - 1:16pm
machine learning
spam
Scalability
Resiliency
resilience
pubcrawl
poisoning attacks
poisoning attack
pattern classification
Organizations
network intrusion detection
malware
machine-learning classifiers
adversarial attacks
learning (artificial intelligence)
invasive software
Intrusion Detection
Human behavior
evasion attacks
Detectors
deep learning
cyber security platforms
cyber detector
Computer crime
AI Poisoning
biblio
Digital Simulation in the Virtual World: Its Effect in the Knowledge and Attitude of Students Towards Cybersecurity
Submitted by grigby1 on Wed, 11/04/2020 - 12:45pm
text-based environment
password usage
Phishing
privacy
pubcrawl
social engineering
student experience
teaching
text analysis
password
user experience
Virtual Learning Environment
Virtual Learning Environments
virtual reality
virtual world
virtual world lessons
VLE
Digital Simulations
Computer crime
computer science education
cyber physical systems
Cybersecurity
cybersecurity attitude
cybersecurity education
cybersecurity knowledge
digital simulation
computer aided instruction
E-Learning
education
Educational institutions
Instruments
invasive software
malware
online scam
biblio
PREEMPT: PReempting Malware by Examining Embedded Processor Traces
Submitted by grigby1 on Fri, 10/30/2020 - 11:19am
learning (artificial intelligence)
zero overhead
tools
software-based AVS
security
Scalability
real-time systems
pubcrawl
program debugging
processor traces
PREEMPT malware
post-silicon validation
malware detection
malware
machine learning-based classifiers
low-latency technique
anti-virus software tools
invasive software
i-o systems security
I-O Systems
HPC
hardware-level observations
Hardware performance counters
Hardware
ETB
embedded trace buffer
embedded systems
embedded processor traces
debug hardware component
Databases
computer viruses
biblio
Intrusion detection for Internet of Things applying metagenome fast analysis
Submitted by grigby1 on Thu, 10/29/2020 - 10:32am
Intrusion Detection
Task Analysis
Resiliency
resilience
pubcrawl
Metrics
metagenome
manet attack prevention
malware
bioinformatics
Internet of Things
information security
genomics
DNA
de Bruijn graph
Databases
Compositionality
biblio
Adversarial Examples Against Image-based Malware Classification Systems
Submitted by grigby1 on Thu, 10/29/2020 - 10:13am
learning (artificial intelligence)
visualization
Robustness
Resiliency
resilience
pubcrawl
privacy
Perturbation methods
Metrics
malware files
malware classification
malware
mal-ware classification techniques
machine learning
adversarial attack
invasive software
image-based malware classification systems
image classification
Human behavior
DL-based classification systems
data visualisation
convolutional neural networks
convolutional neural network malware classifiers
convolutional neural nets
convolution neural network
computer vision
adversarial attacks
biblio
Text Mining for Malware Classification Using Multivariate All Repeated Patterns Detection
Submitted by grigby1 on Thu, 10/29/2020 - 10:12am
privacy
Metrics
mobile computing
mobile devices
Mobile handsets
mobile phones
mobile users
multivariate all repeated pattern detection
Payloads
malware family classification
pubcrawl
randomly selected malware applications
resilience
Resiliency
smart phones
smartphone users
Social network services
Text Mining
invasive software
Androids
ARPaD
bank accounts
cyber criminals
Data mining
Human behavior
Humanoid robots
internet
Android Malware Detection
legitimate application
LERP-RSA
malware
malware classification
malware dataset
malware detection
malware families
biblio
Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks
Submitted by grigby1 on Thu, 10/29/2020 - 10:12am
image-based classification methods
security
Robustness
Resiliency
resilience
pubcrawl
privacy
Microsoft malware dataset
Metrics
malware family classification
malware classification
malware
invasive software
input image
imperceptible nonrandom perturbations
adversarial attacks
image colour analysis
Image color analysis
image classification
Human behavior
feature extraction
convolutional neural networks
convolutional neural network-based malware family classification methods
convolutional neural nets
Conferences
CNN-based malware family classification method
CNN-based classification methods
Analytical models
adversarial example
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »