Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
An Adversary-Centric Behavior Modeling of DDoS Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:58pm
industrial mitigation operation
Scalability
Resiliency
resilience
pubcrawl
Predictive models
Monitoring
Metrics
malware
internet
Adversary Models
Human behavior
feature extraction
distributed denial of service attack
DDoS attack model
Data-driven approach
computer network security
Computer crime
Analytical models
adversary-centric behavior model
biblio
APT Attack Behavior Pattern Mining Using the FP-Growth Algorithm
Submitted by grigby1 on Mon, 03/19/2018 - 12:55pm
host PC security technologies
signature-based intrusion detection systems
Scalability
Resiliency
resilience
pubcrawl
PE files
Pattern Mining
pattern matching
Metrics
malware
Intrusion Detection
Human behavior
advanced persistent threat attacks
FP-growth algorithm
firewalls
digital signatures
Data mining
Conferences
Cancer
APT attack behavior pattern mining
APT attack
application program interfaces
API files
advanced persistent threats
biblio
Detection of Exfiltration and Tunneling over DNS
Submitted by grigby1 on Mon, 03/19/2018 - 12:55pm
IP networks
tunneling
Servers
Scalability
Resiliency
resilience
pubcrawl
Monitoring
Metrics
Measurement
malware
malicious purposes
machine learning models
machine learning
learning (artificial intelligence)
advanced persistent threat attacks
IOC
invasive software
information exfiltration
indicator of compromise
Human behavior
exfiltration
encoding
domain name system
DNS tunnel
DNS
command and control systems
command & control servers
C&c
advanced persistent threats
biblio
Mining Malware Command and Control Traces
Submitted by grigby1 on Mon, 03/19/2018 - 12:55pm
Human behavior
telecommunication traffic
security of data
Scalability
Resiliency
resilience
pubcrawl
Payloads
Pattern recognition
pattern classification
Metrics
malware threats
malware detection rates
malware
invasive software
advanced persistent threat
effective anomaly based detection technique
detecting botnets
Data mining
controller commands
control traces
control payloads
control channel
command and control systems
command and control
Classification algorithms
botnet
anomaly based detection
advanced persistent threats
biblio
Describing Advanced Persistent Threats Using a Multi-Agent System Approach
Submitted by grigby1 on Mon, 03/19/2018 - 12:54pm
natural language
threat intelligence information
software security requirement analysis
Servers
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Organizations
advanced persistent threat attacks
multiagent system approach
multi-agent systems
Metrics
malware
Lead
Human behavior
attack trees
Analytical models
agent-oriented social modelling approaches
advanced persistent threats
biblio
A First Estimation of the Proportion of Cybercriminal Entities in the Bitcoin Ecosystem Using Supervised Machine Learning
Submitted by grigby1 on Mon, 03/05/2018 - 12:14pm
Public key
learning (artificial intelligence)
machine learning
malware
Metrics
pattern classification
Peer-to-peer computing
peer-to-peer payment system
proportion estimation
pubcrawl
illicit activities
Ransomware
resilience
Resiliency
security of data
supervised learning
supervised learning classifiers
supervised machine learning
uncategorised observations
Cybercrime
bitcoin
Bitcoin ecosystem
Bitcoin transactions
blockchain
composability
Computer crime
cryptocurrency
cyber-criminal entities
Bagging classifiers
cybercrime-related categories
cybercriminal entities
Ecosystem
Ecosystems
financial data processing
Gradient Boosting classifiers
gradient methods
illegal goods trading
biblio
Reasoning Crypto Ransomware Infection Vectors with Bayesian Networks
Submitted by grigby1 on Mon, 03/05/2018 - 12:14pm
Infection Vector
uncertainty
Resiliency
resilience
Ransomware
pubcrawl
Payloads
Nickel
Metrics
malware
invasive software
Bayes methods
encryption
Cryptography
crypto ransomware infection vectors
crypto ransomware
conditional probability
composability
belief networks
Bayesian network statistics
Bayesian network
biblio
Detection and Prevention of Crypto-Ransomware
Submitted by grigby1 on Mon, 03/05/2018 - 12:14pm
Elliptic curve cryptography
Servers
Resiliency
resilience
Ransomware
pubcrawl
Private-key cryptosystem ransomware
Payloads
Metrics
malware
file types
encryption
bitcoin
Electronic mail
Domain Generated Algorithm (DGA)
cybercriminals
Cryptography
Cryptographic Ransomware (CGR)
crypto-ransomware prevention
crypto-ransomware detection
Crypto-Ransomware
computer viruses
Computer crime
composability
biblio
Automated Behavioral Analysis of Malware: A Case Study of WannaCry Ransomware
Submitted by grigby1 on Mon, 03/05/2018 - 12:14pm
composability
Data mining
encryption
feature extraction
malware
Metrics
pubcrawl
Ransomware
resilience
Resiliency
Robustness
tools
biblio
RDS3: Ransomware Defense Strategy by Using Stealthily Spare Space
Submitted by grigby1 on Mon, 03/05/2018 - 12:14pm
Cloud Computing
composability
Detectors
encryption
malware
Metrics
pubcrawl
Ransomware
resilience
Resiliency
« first
‹ previous
…
40
41
42
43
44
45
46
47
48
…
next ›
last »