Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
EntropyVis: Malware classification
Submitted by grigby1 on Wed, 06/20/2018 - 11:55am
malicious Windows Portable Executable files
visualization analysis
visualization
Resiliency
resilience
pubcrawl
privacy
nearest neighbour methods
Metrics
malware writers
malware variants
malware similarity
malware features
malware classification
malware
Brightness
local entropy images
kNN algorithm
k-Nearest Neighbor classification algorithm
Jaccard index
invasive software
image classification
Human behavior
Generators
feature extraction
EntropyVis
entropy pixel images
Entropy
Data visualization
data visualisation
biblio
Parallelization of Machine Learning Applied to Call Graphs of Binaries for Malware Detection
Submitted by grigby1 on Wed, 06/20/2018 - 11:50am
program compilers
machine learning algorithms
malware
Malware Analysis
malware detection
Metrics
OpenMP version
parallelization
privacy
machine learning
pubcrawl
resilience
Resiliency
shortest path graph kernel
SPGK
support vector machine
Support vector machines
SVM
graph theory
Binary Analysis
byte-level n-grams
call graphs
compiler intermediate representations
compiler techniques
dynamic trace analysis
Engines
feature extraction
adaptive learning-based techniques
graph-based program representations
graphics processing units
Heterogeneous computing
Human behavior
invasive software
Kernel
learning (artificial intelligence)
biblio
Event graphs for the observation of botnet traffic
Submitted by grigby1 on Wed, 06/20/2018 - 11:50am
information security
telecommunication traffic
statistical flow-based analysis
sensitive information
Resiliency
resilience
pubcrawl
privacy
network vulnerabilities
network resources
network event correlation method
Metrics
Malware Analysis
malware
Algorithm design and analysis
Image edge detection
Human behavior
host machines
graph theory
event graphs
cyber-crime campaigns
Correlation
computer security
computer network security
botnet traffic
botnet
bot programs
biblio
A graph theoretic approach to fast and accurate malware detection
Submitted by grigby1 on Wed, 06/20/2018 - 11:49am
Malware Analysis
unknown malware
storage space
storage management
Robustness
Resiliency
resilience
pubcrawl
privacy
obfuscation attacks
nonsignature malware detection schemes
Metrics
Markov processes
benign software
malware
invasive software
Human behavior
GZero
graph theory
graph theoretic approach
feature extraction
false positive rate
detection time
Databases
Complexity theory
biblio
Detection of transformed malwares using permission flow graphs
Submitted by grigby1 on Wed, 06/20/2018 - 11:49am
privacy
malware variants
Measurement
Metrics
mobile computing
nontransformed malware
permission flow graph
permission flow graphs
permission framework
Malware Analysis
pubcrawl
resilience
Resiliency
signature based detection
smart phones
state-of-the-art graph similarity algorithm
transformed malware
vertex level
graph based similarity metrics
Android malware
Androids
attack surface
code level changes
control flow
detection accuracy
feature extraction
flow graphs
Android app
graph theory
Human behavior
Humanoid robots
invasive software
learning (artificial intelligence)
lightweight static Permission Flow Graph based approach
malicious apps
malware
biblio
Analysis of Android Malware Family Characteristic Based on Isomorphism of Sensitive API Call Graph
Submitted by grigby1 on Wed, 06/20/2018 - 11:49am
invasive software
static analysis approach
sensitive API call graph
Resiliency
resilience
pubcrawl
privacy
Mobile communication
Metrics
malware instances
Malware Analysis
malware
Libraries
Algorithm design and analysis
Humanoid robots
Human behavior
Heuristic algorithms
graph theory
graph similarity metric
call graph structures
application program interfaces
Androids
Android Malware family characteristic analysis
Android (operating system)
android
biblio
Risk analysis of information-leakage through interest packets in NDN
Submitted by grigby1 on Mon, 06/11/2018 - 2:37pm
malware
Support vector machines
security
search engines
search engine information
Scalability
Resiliency
resilience
pubcrawl
paper performs risk analysis
NDN network
Named-Data Networking
Named Data Network Security
anomalous Interest traffic
IP networks
IP
invasive software
internet
interest packets
Interest names
information-leakage
Human behavior
encoding
Dictionaries
computer network security
biblio
Predicting Signatures of Future Malware Variants
Submitted by grigby1 on Wed, 05/30/2018 - 3:05pm
malware detection systems
Vaccines
Training
significant scientific development
signature based defense
security of data
Scalability
Resiliency
resilience
pubcrawl
Predictive models
malware evolution
Clustering algorithms
malware defense
malware
learning (artificial intelligence)
invasive software
History
future malware variants
future malware signatures
future family developments
feature extraction
defensive system
biblio
A Control Flow Graph-Based Signature for Packer Identification
Submitted by grigby1 on Wed, 05/30/2018 - 3:05pm
malware
single signature
signature based defense
Scalability
Resiliency
resilience
Reliability
pubcrawl
packer identification
malware samples
malware detection
malware attacks
Malware Analysis
byte signatures
invasive software
Intel Security Labs
feature extraction
Entropy
Electronic mail
Cryptowall malware
Cryptography
control flow graph
computer security
CFG-based signatures
byte-string signatures
biblio
Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks
Submitted by grigby1 on Wed, 05/30/2018 - 3:04pm
anti-virus
attacks
malware
pubcrawl
resilience
Resiliency
Scalability
signature based defense
Signatures
« first
‹ previous
…
37
38
39
40
41
42
43
44
45
…
next ›
last »