Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
An Association Rule Mining-Based Framework for Profiling Regularities in Tactics Techniques and Procedures of Cyber Threat Actors
Submitted by grigby1 on Fri, 03/15/2019 - 10:52am
machine learning-based framework
TTPs
tools
threat vectors
threat information
Tactics Techniques and Procedures
tactics techniques
STIX
security of data
pubcrawl
profiling regularities
privacy
Metrics
malware
association rule mining
learning (artificial intelligence)
input cyber threat intelligence documents
Information Gain
feature extraction
Data mining
cyber threat intelligence
cyber threat actors
Cyber Threat Actor
cyber domain
CTAs
Conferences
Computer hacking
behavior
biblio
Collecting Cyber Threat Intelligence from Hacker Forums via a Two-Stage, Hybrid Process Using Support Vector Machines and Latent Dirichlet Allocation
Submitted by grigby1 on Fri, 03/15/2019 - 10:52am
security controls
machine learning algorithms
malicious proxy servers
malware
Metrics
nontraditional information sources
privacy
pubcrawl
resource management
machine learning
Support vector machines
SVM
text classification
threat vectors
topic modeling
two-stage hybrid process
Vocabulary
AV detection
learning (artificial intelligence)
leaked credentials
LDA
latent Dirichlet allocation
internet
hybrid machine learning model
hacker forums
hacker forum posts
cyber threat landscape
Cyber Threat Intelligence (CTI)
cyber threat intelligence
cyber security
CTI
Computer hacking
Computer crime
biblio
Trust4App: Automating Trustworthiness Assessment of Mobile Applications
Submitted by aekwall on Mon, 03/11/2019 - 9:38am
smart phones
privacy
privacy health
pubcrawl
publicly available factors
risky apps
security
security assessment
security of data
potentially sensitive data
tools
transparent trustworthiness score
trust
Trust4App framework
Trusted Computing
trustworthiness
trustworthiness indicators
user reviews
Google
Apple App store
application marketplaces
automatic trustworthiness frameworks
automating trustworthiness assessment
composability
comprehensive trustworthiness assessment
Data collection
data privacy
actionable trustworthiness assessment
Google Play store
holistic personalized trustworthiness score
intuitive trustworthiness assessment
malicious developers
malware
Mobile Applications
mobile computing
Mobile Security
biblio
Automating Threat Intelligence for SDL
Submitted by aekwall on Mon, 03/04/2019 - 9:49am
open source threat information sources mining
Automated Secure Software Engineering
vulnerability disclosure
threat intelligence
tactical threat intelligence
Stakeholders
security development lifecycle
security community
SDL
product specific threat indicators
product security
product development
Product design
product deployment
security of data
IT infrastructure
Feeds
enterprise information technology infrastructure
software engineering
Data mining
Databases
composability
pubcrawl
Resiliency
security
malware
Conferences
biblio
A Systems Approach to Indicators of Compromise Utilizing Graph Theory
Submitted by aekwall on Mon, 03/04/2019 - 9:46am
Attack vectors
Workstations
Vectors
systems-based indicators
systems approach
network theory (graphs)
network security breaches
network intrusion
multiple diverse modalities
mathematical tool
IOC
indicators of compromise
complex networks
complex network intrusion
computer network security
Applied Mathematics
attribution
Mathematical model
tools
Metrics
graph theory
composability
pubcrawl
Human behavior
malware
IP networks
human-in-the-loop security center paradigm
biblio
The Android Malware Static Analysis: Techniques, Limitations, and Open Challenges
Submitted by grigby1 on Fri, 02/22/2019 - 3:11pm
malware
static code analysis
static analysis frameworks
static analysis
Semantics
semantic features
Resiliency
pubcrawl
program diagnostics
obfuscation techniques
obfuscation
meta data
manifest-based features
malware detection
android
malicious applications
invasive software
Human behavior
Hardware
feature extraction
Cryptography
composability
commercial antiviruses
code-based features
application metadata-based features
android malware static analysis
Android (operating system)
biblio
Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications
Submitted by grigby1 on Thu, 02/14/2019 - 10:20am
leaked information
US
transport protocols
taint analysis
suspicious URL
static taint analysis
smart phones
SG
Servers
security of data
pubcrawl
Metrics
malware
malicious applications leak multiple types
malicious Android applications
Android (operating system)
IP networks
invasive software
information exfiltration
identity-related sensitive information
hypermedia
Humanoid robots
HTTP-based information exfiltration
HTTP Based
Global Positioning System
composability
CN
clouds
Androids
Android applications
biblio
ERASMUS: Efficient remote attestation via self-measurement for unattended settings
Submitted by aekwall on Wed, 02/13/2019 - 10:59am
Phase measurement
composability
pubcrawl
Human behavior
Resiliency
untrusted remote device
unattended devices
Time measurement
software state
safety-critical applications
real-time systems
real-time devices
Radio frequency
RA techniques
Quality-of-Attestation
potentially expensive computation
Internet of Things
on-demand operation
mobile malware
mobile computing
invasive software
ERASMUS
embedded devices
efficient remote attestation
concrete technique
software integrity
security
Remote Attestation
malware
attestation
IoT devices
biblio
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
Submitted by aekwall on Wed, 02/13/2019 - 10:58am
Runtime
programming
pubcrawl
RA
reduced instruction set computing
remote device integrity
Resiliency
RISC-based embedded devices
RISC-V system-on-chip
Program processors
runtime attestation
security
security of data
security service
SoC
software binaries
system-on-chip
Trusted Computing
embedded Internet of Things devices
composability
control-flow attacks
control-flow attestation schemes
data flow computing
data integrity
data-flow events
data-oriented programming
DOP attacks
attestation
embedded systems
hardware-assisted remote attestation scheme
Human behavior
Internet of Things
lightweight hardware-assisted attestation of program execution
LiteHAX
malicious modification
malware
biblio
Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data Repositories
Submitted by aekwall on Wed, 02/13/2019 - 10:58am
mobile data collectors
composability
pubcrawl
Human behavior
Resiliency
whitebox cryptography
tampered drones
Table lookup
software-based attestation
software integrity
software attestation
secure communications
secret key protection
privacy-sensitive data
security of data
malicious physical/cyber attacks
group attestation scheme
drones
data repositories
data memory
data encryption
code attestation technique
malware
attestation
secret keys
private key cryptography
data privacy
encryption
« first
‹ previous
…
33
34
35
36
37
38
39
40
41
…
next ›
last »