Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
Towards Efficient Malware Detection and Classification using Multilayered Random Forest Ensemble Technique
Submitted by grigby1 on Thu, 10/29/2020 - 10:12am
malware authors
Vision-based malware analysis
traditional malware
Resiliency
resilience
pubcrawl
privacy
pattern classification
multilayered random forest ensemble technique
microsoft windows
Metrics
malware patterns
malware images
malware detection
malware classification
Adaptation models
malware
learning (artificial intelligence)
invasive software
hybrid model
Human behavior
Gray-scale
Forestry
feature extraction
Ensemble forest
deep neural networks
deep learning models
cyber security
Computational modeling
biblio
Convolutional Neural Networks as Classification Tools and Feature Extractors for Distinguishing Malware Programs
Submitted by grigby1 on Thu, 10/29/2020 - 10:11am
malware detection
visualization
Training
testing
SVM
Support vector machines
support vector machine
Resiliency
resilience
pubcrawl
privacy
pattern classification
nearest neighbour methods
microsoft malware classification challenge
Metrics
malware programs
anti-malware industry
malware classification
malware
learning (artificial intelligence)
KNN
k-nearest neighbors
invasive software
Human behavior
feature extractors
feature extraction
convolutional neural networks
convolutional neural nets
computer architecture
computationally efficient CNN-based architecture
CNN based algorithms
classification tools
biblio
Malware Classification System Based on Machine Learning
Submitted by grigby1 on Thu, 10/29/2020 - 10:11am
malware
static analysis
Resiliency
resilience
pubcrawl
privacy
pattern classification
multifeature selection fusion
Metrics
malware classification system
malware classification
Classification system
machine learning
Libraries
learning (artificial intelligence)
invasive software
Human behavior
high-efficiency automatic classification system
Feature Selection
feature extraction
Entropy
biblio
Malware Classification Using Machine Learning Algorithms and Tools
Submitted by grigby1 on Thu, 10/29/2020 - 10:10am
malware
tools
Support vector machines
Resiliency
resilience
Random Forest
pubcrawl
privacy
pattern classification
Metrics
matrix algebra
malware samples
malware classification
Classification algorithms
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Human behavior
feature extraction
family classification
emerging malwares
confusion matrix
comparative classification
comparable features
Cohen's Kappa
biblio
An Xception Convolutional Neural Network for Malware Classification with Transfer Learning
Submitted by grigby1 on Thu, 10/29/2020 - 10:10am
Microsoft malware dataset
Xception model
Xception convolutional neural network
Xception
VGG16 model
transfer learning
Training
testing
Support vector machines
special CNN architecture
Resiliency
resilience
pubcrawl
privacy
Predictive models
pattern classification
CNN models
Metrics
malware image classification
malware classification problem
malware classification
malware
learning (artificial intelligence)
invasive software
image-based malware classification
image classification
Human behavior
Gray-scale
feature extraction
ensemble model
convolutional neural network (CNN)
convolutional neural nets
biblio
Evolved Similarity Techniques in Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:14am
malware function similarity techniques
Zeus malware
Zeus
Semantics
reverse engineering
Resiliency
Registers
pubcrawl
privacy
Predictive Metrics
Metrics
Manuals
malware similarity
malware samples
Malware Analysis
malware function pairs
malware family
malware evolution
malware authors
malware
invasive software
Human behavior
function call graph
evolved similarity techniques
evolved code
Databases
binary similarity
graph theory
biblio
Using Deep-Learning-Based Memory Analysis for Malware Detection in Cloud
Submitted by aekwall on Mon, 10/26/2020 - 11:13am
dynamic analysis approach
virtual machine
virtual machines
machine-learning-based approaches
file system
Virtual machine monitors
cloud nodes
deep learning technology
deep-learning-based memory analysis
Predictive Metrics
malicious binary files
malware execution
Memory Analysis
memory analysis approach
real-world malwares
run-time overhead
zero-day malware
Monitoring
Gray-scale
Malware Analysis
Virtual machining
privacy
Metrics
deep learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
invasive software
malware detection
malware
Cloud Computing
biblio
Evolutionary Computation for Improving Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:13am
program debugging
variable-strength covering arrays
software improvement
malicious code
individual software artifacts
GI-based bug repair
GI-based approach
genetic improvement
automated repair
automated malware analysis
benign software
Genetics
evolutionary computation
malicious software
Predictive Metrics
Servers
malware samples
Malware Analysis
genetic algorithms
software maintenance
privacy
tools
Metrics
pubcrawl
Human behavior
Resiliency
invasive software
security
malware
biblio
A Novel Machine Learning Based Malware Detection and Classification Framework
Submitted by aekwall on Mon, 10/26/2020 - 11:13am
complex malware types
Predictive Metrics
computer systems
Feature Selection
dynamic analysis
feature selection algorithms
machine learning models
classification accuracy
accurate malware detection
analysis report
classification framework
malware samples
fine-grained classification
high detection
malware analysis framework
malware files
minimum computation cost
selection module
signature-based malware detection techniques
system activities
time progresses
Training
invasive software
machine learning algorithms
feature extraction
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
pattern classification
malware
machine learning
testing
privacy
Virtual machining
Malware Analysis
cuckoo sandbox
malware classification
malware detection
static and dynamic analysis
biblio
IoT Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:12am
machine learning
Ollydebug
IoT malware analysis
information system integrity
information system confidentiality
information system availability
CIA triad
malicious users
malicious software
Predictive Metrics
malware attacks
Malware Analysis
image recognition
privacy
IoT
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
invasive software
security
malware
data integrity
IoT devices
Internet of Things
Conferences
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
…
next ›
last »