Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
Identification of Distributed Malware
Submitted by grigby1 on Mon, 06/10/2019 - 12:59pm
public domain software
malware writers
Metrics
mobile computing
Mobile handsets
multiple anti-virus apps
open source platform
personal data
privacy
pubcrawl
malware prevention
Resiliency
security
Servers
simple worms
smart phones
smartphone revolution
sophisticated DDOS
static analysis
technological complexities increase
generic viruses
Android malware
Android system
attackers
botnets
computer malware
computer viruses
distributed direction
distributed malware
fully functional portable computers
android
Google
graph matching algorithm
graph theory
Human behavior
inholding multiple applications
Labeling
malware
Malware Analysis
malware detection
biblio
A Graph-Based Model for Malicious Software Detection Exploiting Domination Relations Between System-Call Groups
Submitted by grigby1 on Mon, 06/10/2019 - 12:58pm
Algorithms
Compositionality
detection
graph theory
graphs
Human behavior
malware
Malware Analysis
Predictive Metrics
privacy
pubcrawl
Resiliency
Scientific Computing Security
security
Systems
biblio
ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures
Submitted by grigby1 on Mon, 06/10/2019 - 12:58pm
android
Correlation
Cyber-Infrastructure
graph analysis
graph theory
Human behavior
malware
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
biblio
A method to detect Internet of Things botnets
Submitted by aekwall on Mon, 05/20/2019 - 9:00am
IoT Security 2018
widespread botnets
unauthorized access
security of data
security
Resiliency
pubcrawl
Protocols
performance evaluation
Metrics
malware
main security problems
Logistics
logistic regression
authorisation
IoT devices
IoT
invasive software
Internet of Things
Human behavior
Cybersecurity
computer network security
composability
common characteristics
botnets
Botnet detection
botnet
biblio
Hardware-Based Memory Acquisition Procedure for Digital Investigations of Security Incidents in Industrial Control Systems
Submitted by grigby1 on Thu, 05/09/2019 - 9:47am
reliable code
malware
memory contents collecting
operating system
operating systems
operating systems (computers)
production engineering computing
pubcrawl
Reliability
malicious software functions
resilience
Resiliency
resulting contents
Scalability
scalable
security incidents
software methods
volatile memory
guaranteed reliability
attacked computer
comprehensive solutions
computer security
continuous monitoring systems
control engineering computing
data collection procedure
digital investigations
forensic
Operating systems security
hardware-based memory acquisition procedure
ICs
industrial control
Industrial Control Systems
information security
integrated circuits
invasive software
biblio
Identifying Malicious Botnet Traffic Using Logistic Regression
Submitted by grigby1 on Fri, 04/05/2019 - 9:24am
regression analysis
Logistics
machine learning
malware
Metrics
network security
network traffic
Payloads
popular network monitoring framework
pubcrawl
logistic regression
resilience
Resiliency
security of data
significant economic harm
social harm
statistical learning method
telecommunication traffic
vulnerable devices
cyber-attacks
botnet
botnet activity
Botnet detection
botnet infestation
botnet malware
botnets
Compositionality
cyber security
aggregate statistics
feature extraction
Hidden Markov models
identifying malicious botnet traffic
internet
intrusion detection system
invasive software
learning (artificial intelligence)
lightweight logistic regression model
biblio
A Botnet Detection Approach Based on the Clonal Selection Algorithm
Submitted by grigby1 on Fri, 04/05/2019 - 9:24am
HTTP botnet detection
transport protocols
Training
telecommunication traffic
Resiliency
resilience
pubcrawl
Peer-to-peer computing
P2P botnet detection
Metrics
malware
IRC botnet detection
IP networks
invasive software
Immune system
hypermedia
artificial immune system
DNS botnet detection
corporate area networks
computer systems
computer network security
Computer crime
Compositionality
clonal selection algorithm
Classification algorithms
botnets
Botnet detection
botnet
BotGRABBER system
benign network traffic
artificial immune systems
biblio
Towards Situational Awareness of Botnet Activity in the Internet of Things
Submitted by grigby1 on Thu, 03/28/2019 - 2:12pm
deep learning
word embedding
mirai
long short term memory networks
situational awareness
cyber situational awareness
Data Analytics
Insurance
critical infrastructures
DDoS
botnet
Computer crime
Servers
malware
IoT
learning (artificial intelligence)
invasive software
composability
Resiliency
Metrics
pubcrawl
Decision Making
resilience
security of data
risk management
Internet of Things
data privacy
biblio
Anomaly Detection in Cyber Security Attacks on Networks Using MLP Deep Learning
Submitted by grigby1 on Fri, 03/22/2019 - 12:01pm
J48
WEKA
Scalability
Resiliency
resilience
pubcrawl
multilayer perceptrons
Multilayer Perceptron (MLP)
Multilayer Perceptron
MLP deep learning
Metrics
malware data
malware attacks
malware
machine learning
learning (artificial intelligence)
Advanced Security Network Metrics \\& NonPayload-Based Obfuscations
invasive software
information security
ID3
feature extraction
deep learning
Decision trees
cyber security threats
cyber security attacks
cyber security
Correlation
computer network security
C4.5
big data security
Big Data
Anomaly Detection
biblio
Automated Generation and Selection of Interpretable Features for Enterprise Security
Submitted by grigby1 on Fri, 03/22/2019 - 12:00pm
machine learning method
Training data
security of data
security
Scalability
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
malware
malicious activity detection
big data security
learning (artificial intelligence)
Fourier transforms
fourier analysis
feature extraction
enterprise security logs
DNF formulas
cyber security
Clustering algorithms
classifiers
Boolean functions
« first
‹ previous
…
32
33
34
35
36
37
38
39
40
…
next ›
last »