Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
A tool to compute approximation matching between windows processes
Submitted by aekwall on Wed, 01/16/2019 - 1:08pm
digital forensics scenarios
Windows Operating System Security
windows processes
Windows memory dump
Windows
volatility
memory image file
image matching
Image forensics
forensics memory image
Forensics
forensic memory analysis
forensic analysis
file organisation
executable file
dumping process
tools
cryptographic hashing functions
cryptographic hash values
bytewise approximate matching
Binary codes
approximation matching algorithms
Approximation algorithms
Microsoft Windows (operating systems)
microsoft windows
Cryptography
malware
composability
Resiliency
Metrics
pubcrawl
biblio
Windows Virtualization Architecture For Cyber Threats Detection
Submitted by aekwall on Wed, 01/16/2019 - 1:08pm
Virtual machine monitors
prediction tool
prediction tools development
pubcrawl
Real-time monitoring
Resiliency
Rootkits
static methods
system monitoring
target Windows machines
virtual machine introspection
Microsoft Windows (operating systems)
virtual machines
virtual memory introspection
Virtualization
VMI
Windows operating system
Windows Operating System Security
Windows OS
Windows threat detection
Windows virtualization architecture
Xen hypervisor
machine learning
composability
cyber breaches
cyber threats detection
Cybersecurity
data structures
hidden security issues
invasive software
Kernel
kernel data structures
learning (artificial intelligence)
alert system administrators
machine learning techniques
malicious process behavior
malware
malware detection
malware threats
memory data structure identification
memory forensic analysis
Metrics
microsoft windows
biblio
A Zero-Day Resistant Malware Detection Method for Securing Cloud Using SVM and Sandboxing Techniques
Submitted by grigby1 on Mon, 12/10/2018 - 10:38am
OS images
zero-day resistant malware detection method
Zero-day resistance
Zero-day attacks
Zero day attacks
user machine
tools
SVM
Support vector machines
security of data
sandboxing techniques
Resiliency
resilience
pubcrawl
phase exhaustive technique
Cloud Computing
operating systems (computers)
networking schemes
n-class SVM
Metrics
malware
machine learning
IT infrastructure
feature extraction
defense
Conferences
computer security
composability
clouds
biblio
Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning
Submitted by grigby1 on Mon, 12/10/2018 - 10:34am
iobt
Scalability
Robustness
Resiliency
resilience
pubcrawl
malware detection
malware
machine learning
Androids
Internet of Things Malware
Internet of battlefield things
internet
Human Factors
feature extraction
deep learning
Deep Eigenspace Learning
computer security
biblio
Digging into Browser-Based Crypto Mining
Submitted by grigby1 on Mon, 11/19/2018 - 11:16am
blockchain
cryptocurrency
cryptojacking
Human behavior
malware
Metrics
mining
Monero
pubcrawl
resilience
Resiliency
Wasm
Webassembly
biblio
MineSweeper: An In-Depth Look into Drive-by Cryptocurrency Mining and Its Defense
Submitted by grigby1 on Mon, 11/19/2018 - 11:16am
cryptocurrency
cryptojacking
drive-by attacks
Human behavior
malware
Metrics
mining
pubcrawl
resilience
Resiliency
biblio
Detecting Cryptomining Using Dynamic Analysis
Submitted by grigby1 on Mon, 11/19/2018 - 11:15am
Browsers
computer security
cryptocurrency
cryptojacking
Human behavior
invasive software
malware
Metrics
pubcrawl
resilience
Resiliency
Runtime
standards
biblio
Analyst Intuition Inspired High Velocity Big Data Analysis Using PCA Ranked Fuzzy K-Means Clustering with Multi-Layer Perceptron (MLP) to Obviate Cyber Security Risk
Submitted by grigby1 on Wed, 11/14/2018 - 12:21pm
pattern classification
learning (artificial intelligence)
log history annotation
malware
malware attacks
manually labelled data
MLP
Monitoring
Multi-layer Perceptron (MLP)
multilayer perceptrons
network datasets
network protocols
network user
neural network classifier multilayer perceptron base
IP networks
pattern clustering
PCA ranked fuzzy k-means clustering
principal component analysis
Principal Component Analysis (PCA)
pubcrawl
resilience
Resiliency
Scalability
scoring system
security
special semisupervise method
statistical data generation
Virus
cyber threats
analyst intuition inspired high velocity big data analysis
Artificial Intelligence
attacker IP addresses characteristics
Big Data
Clustering algorithms
computer networks
computer network security
computer security
cyber-attacks
cyber security
cyber security expert
cyber security log classification
cyber security risk
Analyst Intuition
data analysis
Data mining
efficient security monitoring system
Expectation Regulated
expert system
expert systems
Fuzzy k-means (FKM)
fuzzy set theory
High Velocity
Human behavior
integrated datasets
invasive software
biblio
Analyst Intuition Based Hidden Markov Model on High Speed, Temporal Cyber Security Big Data
Submitted by grigby1 on Wed, 11/14/2018 - 12:21pm
Resiliency
HMM state
Human behavior
IP addresses
malware
Multi-layer Perceptron (MLP)
network protocols
Principal Component Analysis (PCA)
probabilistic models
pubcrawl
resilience
High Velocity
Scalability
scoring system
security
security attacks
security of data
statistical data
temporal cyber security big data
time series
unsure attack
Virus
Data mining
attacker
Big Data
Clustering algorithms
computer security
cyber security
cyber security attack
cyber security data
cyber security expert
cyber security log
data analysis
Analyst Intuition
Data models
Expectation Regulated
expert systems
forecasting time series data
fuzzy k mean cluster
Fuzzy k-means (FKM)
fuzzy set theory
hidden Markov model
Hidden Markov Model (HMM)
Hidden Markov models
biblio
A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation
Submitted by grigby1 on Wed, 11/14/2018 - 12:15pm
malicious behavior detection
VMI
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
virtual machine introspection techniques
tenant network
security of data
security
Resiliency
resilience
pubcrawl
Monitoring
misuse detection techniques
malware
attack taxonomy
machine learning
intrusion detection techniques
expandability
data mining techniques
Data mining
Compositionality
CloudVMI
CloudI
Cloud Security
cloud introspection
cloud computing environment
Cloud Computing
block chain technology
behavior analysis
« first
‹ previous
…
35
36
37
38
39
40
41
42
43
…
next ›
last »