Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
Malsign: Threat Analysis of Signed and Implicitly Trusted Malicious Code
Submitted by grigby1 on Wed, 05/30/2018 - 3:55pm
PKCS
trusted software providers
Trusted Computing
threat analysis
targeted attacks
signing keys
signed malware
signed code
Servers
Scalability
Resiliency
pubcrawl
private key cryptography
private key
PKI Trust Models
PKI
benign software
Metrics
malware
Malsign
malicious code signing
invasive software
implicitly trusted malicious code
Human Factors
Human behavior
genuine software
digital signatures
Computer crime
Companies
code signing infrastructure
code signing
Browsers
biblio
Vulnerability Analysis for Simultaneous Attack in Smart Grid Security
Submitted by grigby1 on Thu, 05/24/2018 - 12:30pm
power grid vulnerability analysis
Vulnerability Analysis
total blackout
smart power grids
Smart Grids
smart grid security
Simultaneous attack
security
Resiliency
resilience
reduced calculation time
pubcrawl
power system stability
power system security
power system measurement
Analytical models
power grid system
power grid infrastructures
modified cascading failure simulator
Metrics
malware
Generators
generation power loss
general power system test cases
failure analysis
damage measurement matrix
Compositionality
composability
cascaded outage
cascaded failure simulator
biblio
Dynamic Ransomware Protection Using Deterministic Random Bit Generator
Submitted by grigby1 on Thu, 05/24/2018 - 12:16pm
protection
Scalability
Resiliency
resilience
Ransomware
random number generator
random number generation service
random number generation
random key generation
public key cryptography
Public key
pubcrawl
Communication networks
Metrics
malware
Human behavior
Generators
encryption key
encryption
dynamic ransomware protection method
deterministic random bit generator
CryptoVirus
crypto-API
computer viruses
biblio
IoT Sandbox: To Analysis IoT Malware Zollard
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
collaboration
composability
IoT
malware
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
sandbox
sandboxing
biblio
Identifying Email Threats Using Predictive Analysis
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
Policy
URL
unsolicited e-mail
unseen emails
Uniform resource locators
targeted attacks
Support vector machines
static analysis
sandboxing
Random Forest
pubcrawl
Predictive models
predictive analysis approach
Policy-Governed systems
Policy-Governed Secure Collaboration
Analytical models
malware attachment
malware
malicious emails
machine learning model
machine learning algorithms
learning (artificial intelligence)
invasive software
feature extraction
email threat identification
Electronic mail
Computer crime
composability
collaboration
attackers
biblio
Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
Malware Analysis
Snort
Signature-based detection
Servers
sandboxing environment
sandboxing
pubcrawl
Ports (Computers)
Policy-Governed systems
Policy-Governed Secure Collaboration
Policy
openstack
NIDS module
network intrusion detection systems
network intrusion detection system
Cloud Computing
malware
malicious attacks
invasive software
Intrusion Detection
honeypot networks
Honeypot Network
Dynamic Malware Analysis
cost services
computer architecture
composability
collaboration
cloud-computing technology
Cloud Security
cloud environment
biblio
RansHunt: A Support Vector Machines Based Ransomware Analysis Framework with Integrated Feature Set
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
ransomware families
malwares
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
RansHunt
Ransomware
ransomware analysis framework
malware
ransomware samples
ransomware variants
sandboxing
static analysis
static code features
static features
Support vector machines
Algorithm design and analysis
machine learning
learning (artificial intelligence)
invasive software
integrated feature set
individual analysis approach
hybrid cryptosystem
Heuristic algorithms
feature extraction
Electronic mail
dynamic analysis
cyber-crime
Cryptography
crypto-ransomwares
composability
collaboration
biblio
Capturing Malware Propagations with Code Injections and Code-Reuse Attacks
Submitted by K_Hooper on Wed, 05/02/2018 - 10:44am
Code injection
composability
malware
Metrics
pubcrawl
security
taint analysis
biblio
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs
Submitted by grigby1 on Tue, 05/01/2018 - 11:22am
Phishing
unsolicited e-mail
top-level domains security
top-level domains
TLDs security
statistical regression model
software metrics
Servers
security performance measurement
security
reputation metrics design
reputation metrics
regression analysis
phishing datasets
Computer crime
Measurement
malware datasets
malware
IP networks
invasive software
internet
intermediary incentives
Feeds
Ecosystems
domain name system
domain abuse
DNS ecosystem
cybercriminals
biblio
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs
Submitted by grigby1 on Mon, 04/30/2018 - 3:09pm
Phishing
unsolicited e-mail
top-level domains security
top-level domains
TLDs security
statistical regression model
software metrics
Servers
security performance measurement
Security Metrics
security
reputation metrics design
reputation metrics
regression analysis
pubcrawl
phishing datasets
Computer crime
Metrics
Measurement
malware datasets
malware
IP networks
invasive software
internet
intermediary incentives
Feeds
Ecosystems
domain name system
domain abuse
DNS ecosystem
cybercriminals
« first
‹ previous
…
38
39
40
41
42
43
44
45
46
…
next ›
last »