Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
Malware Evasion Attack and Defense
Submitted by grigby1 on Tue, 02/18/2020 - 10:53am
malware detection systems
white-box evasion attacks
White Box Security
white box cryptography
Training data
Training
security
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
ML-based malware detector
ML classifier
Metrics
malware evasion attack
adversarial example
malware
machine learning classifiers
learning (artificial intelligence)
invasive software
grey-box evasion attacks
Evasion Attack
Detectors
defense approaches
defense
Data models
composability
black-box attacks
Adversarial Machine Learning
adversarial examples
biblio
Model for Study of Malware Propagation Dynamics in Wireless Sensor Network
Submitted by aekwall on Mon, 02/17/2020 - 1:35pm
Wireless Sensor Network
Susceptible-Exposed-Infectious-Recovered-Dead model
Propagation
neighboring sensor nodes
malware status
malware spread
malware propagation dynamics
malicious signals presence
Grippers
Equilibrium points
epidemiology basic reproduction number
Epidemic model
early detection method
critical security challenges
computer viruses
WSN
telecommunication security
security mechanism
Stability analysis
sensor security
detection
Analytical models
Metrics
Computational modeling
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
invasive software
malware
biblio
Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators
Submitted by aekwall on Mon, 02/17/2020 - 1:33pm
IoC-centric cyber security sensor networks
design decisions
design principles
distributed cyber security sensor networks
effective cyber defence
exchange process
extensive human involvement
indicator distribution
information brokers
information exchange
cyber security sensor networks
national authorities
national cyber security
national cyber security centres
national cyber security sensor networks
scanning process
security data
security information
small-scale demonstrators
vital recommendations
composability
computer network security
Cryptography
Organizations
malware
Task Analysis
invasive software
Resiliency
Human behavior
pubcrawl
Computer crime
Metrics
Industries
Attack vectors
indicators of compromise
Feeds
sensor network
sensor security
National security
confidential indicators
biblio
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
Submitted by grigby1 on Mon, 02/10/2020 - 10:35am
search problems
program assemblers
pubcrawl
Representation-Learning
resilience
Resiliency
reverse engineering
robust clone search engine
robust vector representation
search engines
optimizations
Semantics
Software
static code analysis
static representation robustness
Static-Analysis
Syntactics
vector representation
Vectors
Vulnerability-Search
dynamic clone search approaches
assembly clone search engine
assembly code representation learning model
assembly function
binary clone search
Binary-Code-Search
Cloning
code obfuscation techniques
compiler optimization options
composability
Asm2Vec
feature engineering process
Human behavior
invasive software
learning (artificial intelligence)
lexical semantic relationships
malware
optimising compilers
optimization
biblio
Exploring the Dark Web for Cyber Threat Intelligence Using Machine Leaning
Submitted by grigby1 on Tue, 01/28/2020 - 1:38pm
Doc2Vec
tools
Resiliency
resilience
pubcrawl
privacy
natural language processing
malware
machine learning
machine leaning
learning (artificial intelligence)
intelligence
information security
artificial intelligence security
Data models
darkweb
dark web
cyberattack
cyber threat intelligence
cyber intelligence
Cyber Attacks
cyber attack techniques
counter measure
Computer crime
composability
biblio
Understanding Security Requirements for Industrial Control System Supply Chains
Submitted by grigby1 on Tue, 01/21/2020 - 11:16am
Scalability
organizational aspects
Organizations
pubcrawl
resilience
Resiliency
risk assessment
risk decision-making
risk management
organisational aspects
security industrial control system supply chains
security requirements
Standards organizations
stuxnet attack
supply chain management
supply chain risk assessment
supply chains
supply chain security
nuclear facility
Natanz city
malware
Iran
integrated circuits
Industrial Control Systems Anomaly Detection
Industrial Control Systems
industrial control
human issues
Decision Making
cyber-physical systems
cyber-physical infrastructures
control system security
control engineering computing
Computer crime
biblio
Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning
Submitted by aekwall on Mon, 01/20/2020 - 11:12am
power-grid controller anomaly detection
control engineering computing
LSTM
actuators
data-driven defense system
enhanced temporal deep learning
Hardware Performance Counter
Kolmogorov–Smirnov test
power-grid controller
Human Factors
power-grid system
programmable logic controller
security-critical cyber-physical systems
temporal deep learning detection
temporal deep learning model
time 360.0 ms
zero trust
Scalability
deep learning
sensors
process control
power grids
power system security
power engineering computing
Zero-day attacks
Substations
policy-based governance
pubcrawl
Resiliency
learning (artificial intelligence)
invasive software
malware
Hardware
biblio
Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical Systems
Submitted by aekwall on Mon, 01/20/2020 - 11:05am
primary safety requirement
Benders decomposition algorithm
bi-level integer programs
DSPTI
dynamic defense strategy
Loss measurement
model predictive control strategy
multi-stage dynamic game
predictive control
advanced persistent threat attacks
Real-Time Decision Making
shortest-path tree interdiction Stackelberg game
specialized anti-malware program
SSPTI
static game
stealth malware propagation
Zero Day Attacks and Defense
Safety
APT attacks
CPS
integer programming
Predictive Metrics
Games
Decision Making
composability
pubcrawl
Resiliency
cyber-physical systems
invasive software
game theory
security
malware
Conferences
biblio
Detecting and Analyzing Zero-Day Attacks Using Honeypots
Submitted by aekwall on Mon, 01/20/2020 - 11:05am
Predictive Metrics
Zero-day attacks
zero-day attack detection
zero-day attack analysis
Zero Day Attacks and Defense
Virtual machining
virtual machines
virtual machine
Snort intrusion prevention system
Snort intrusion detection system
security vulnerability
security
Resiliency
pubcrawl
Protocols
Zero day attacks
Ports (Computers)
operating systems
malware
IP networks
invasive software
intrusion detec- tion/prevention system
information security domain
honeypot system
honeypot
Dictionaries
computer network security
computer network
composability
defense
file
Combating Environment-aware Malware
Submitted by Michail Polychron... on Wed, 01/08/2020 - 1:10pm. Contributors:
Michalis Polychronakis
Nick Nikiforakis
Project Slides
malware
Intrusion Detection
1617902
SaTC PI Meeting 2019
« first
‹ previous
…
28
29
30
31
32
33
34
35
36
…
next ›
last »