Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
MalFire: Malware firewall for malicious content detection and protection
Submitted by K_Hooper on Wed, 04/04/2018 - 9:00am
malicious content protection
Web servers
vulnerability detection
user data security
user data privacy
tools
sensitive information
security
Resiliency
pubcrawl
privacy
online portion
Metrics
malware injection
malware firewall
malware
ad blocking tool
malicious content detection
MalFire
IP networks
invasive software
internet
Human behavior
firewalls
data privacy
Content Injection
contemporary threats
Compositionality
Companies
adware injection
adware content
Adware
biblio
Malware Detection for Secure Microgrids: CoSSMic Case Study
Submitted by K_Hooper on Wed, 04/04/2018 - 8:59am
Microgrids
vulnerability detection
SmartGrid
smart-devices
security vulnerability
security threats
security
sandbox
Resiliency
pubcrawl
Protocols
power system security
power engineering computing
performance evaluation
Monitoring
Compositionality
microgrid ecosystem
microgrid
Metrics
malware detection
malware
invasive software
Human behavior
energy infrastructure
electric microgrids
distributed power generation
Cybersecurity
cyber vulnerabilities
CoSSMic project
biblio
Optimizing Detection of Malware Attacks through Graph-Based Approach
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
Metrics
hook attacks
Host-based
invasive software
Kernel
malicious code execution
malicious system call
malware
malware attacks
Graph-model
Monitoring
optimisation
optimization
pubcrawl
resilience
Resiliency
signature-based model
tools
computer viruses
API hook
application program interfaces
application programming interface
attack graphs
code obfuscation technique
communication technology
composability
Computational modeling
API graph-based model
Computers
digital signatures
graph comparison
graph partition
graph theory
graph-based approach
graph-generation
biblio
Autoencoder-Based Feature Learning for Cyber Security Applications
Submitted by grigby1 on Mon, 04/02/2018 - 11:40am
invasive software
Vectors
Training
Resiliency
resilience
pubcrawl
policy-based governance
pattern classification
Metrics
malware classication
malware
machine learning
learning (artificial intelligence)
AE
Intrusion Detection
feature vector
feature learning
feature extraction
encoding
cyber security
computer security
computer network security
autoencoder
Artificial Neural Networks
anomaly intrusion detection
biblio
HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
mobile computing
Static and Dynamic Analysis of Apps
static analysis
source code
security threats
security of data
security
Resiliency
resilience
Repackaging
Registers
reflection
pubcrawl
program diagnostics
obfuscated Android applications
Mobile Security
Android (operating system)
malware
Java
HyDroid
hybrid approach
Humanoid robots
dynamic analysis
Compositionality
application services
application program interfaces
APIs
API call trace generation
Androids
Android applications
Android API call traces
Android API
biblio
Dynamic Malware Detection Using API Similarity
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
malware
user-confidential information
Trojans
Trojan horses
trojan
tools
Sea measurements
Resiliency
resilience
pubcrawl
pattern matching
malware-detection method
malware samples
Malware Analysis
API
invasive software
information security
Hacker
feature extraction
dynamic Malware detection method
Data mining
credit card details
credit card
Computer crime
Compositionality
application program interfaces
APIs
API similarity
biblio
A New Mobile Botnet Classification Based on Permission and API Calls
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
pubcrawl
malware
mobile botnet attacks
mobile botnet classification
mobile botnet detection
Mobile communication
mobile computing
pattern classification
program diagnostics
malicious mobile applications
random forest algorithm
random processes
resilience
Resiliency
smart phones
smartphone
static analysis
Android (operating system)
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Humanoid robots
Feature Selection
feature extraction
Drebin dataset
Compositionality
application programming interface
application program interfaces
APIs
API calls
Androids
Android botnet
biblio
An API Honeypot for DDoS and XSS Analysis
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
DDoS
XSS
testing
Servers
Resiliency
resilience
REpresentational State Transfer Application Programming Interface
pubcrawl
malware
invasive software
distributed denial of service attack
API honeypot
cross-site scripting malware insertion
cross-site scripting
Concurrent computing
computer network security
Computer crime
Compositionality
attack profiles
application program interfaces
APIs
biblio
Countermeasureing Zero Day Attacks: Asset-Based Approach
Submitted by grigby1 on Mon, 03/26/2018 - 12:13pm
Predictive Metrics
zero-day attack detection
Zero Day Attacks and Defense
zero day attack countermeasureing
system calls
security of data
security models
security life cycle
security domain
security
Resiliency
pubcrawl
Zero day attacks
operating systems
Monitoring
Metrics
malware
Games
defense mechanisms
Databases
composability
Companies
asset-based approach
defense
biblio
Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI
Submitted by grigby1 on Mon, 03/26/2018 - 11:57am
code signing
composability
compromised certificates
malware
Metrics
PKI
PKI Trust Models
pubcrawl
resilience
Resiliency
security
windows authenticode
Windows operating system
« first
‹ previous
…
39
40
41
42
43
44
45
46
47
…
next ›
last »