Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
Ransomware
Metrics
Mobile communication
mobile computing
mobile devices
Mobile handsets
mobile ransomware
performance evaluation
pubcrawl
RANSOMSAFEDROID prototype
malware
resilience
Resiliency
Scalability
secure local persistent partition
sensitive data
software performance evaluation
storage management
Trusted Computing
TrustZone based backup service
data recovery
android encryption
Android ransomware dissemination
Androids
ARM TrustZone extension
back-up procedures
backup tools
Cryptography
data encryption
Data protection
Android (operating system)
device filesystem
Hardware
Human behavior
Human Factors
Humanoid robots
i.MX53 development board
incremental backups
invasive software
biblio
Droidrevealer: Automatically detecting Mysterious Codes in Android applications
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
Libraries
undetectable codes
smart phones
Sensitive Behavior
Scalability
Resiliency
resilience
pubcrawl
Mysterious Codes
Metrics
malware detection
malware
malicious code snippets
android
invasive software
Humanoid robots
Human Factors
Human behavior
encryption
Droidrevealer
Decrypt
Decode
Androids
Android malware
android encryption
Android (operating system)
biblio
A theoretical review of social media usage by cyber-criminals
Submitted by grigby1 on Thu, 02/15/2018 - 10:44am
online social networking sites
tools
threats
stalking
spam
social networking (online)
social media usage
social media
Social Engineering Attacks
Scalability
Resiliency
resilience
pubcrawl
Phishing
click-jacking prevention
malware
invasive software
identity theft
Human Factors
human factor
Human behavior
Facebook
Electronic mail
cybercriminal
cyber-criminals
Cross Site Scripting (XSS)
Cross Site Scripting
Computer crime
biblio
Autonomous and distributed internet security (AIS) infrastructure for safe internet
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
Router Systems
security
Artificial Intelligence
artificial intelligence security
Computer crime
Human behavior
internet
IP networks
malware
Metrics
pubcrawl
Resiliency
Routing
Scalability
Servers
biblio
Acquiring Cyber Threat Intelligence through Security Information Correlation
Submitted by grigby1 on Tue, 02/06/2018 - 1:07pm
reputation damage
highly sophisticated cyber attacks
incident handling
intellectual property theft
Joining processes
knowledge acquisition
malware
Measurement
Metrics
multistage cyber-physical attack campaigns
pubcrawl
health risk
Resiliency
safety risk
security information correlation
security of data
security operation centers
shutdowns
situational awareness
SoC
threat actors
cyber physical systems
APT
attack countermeasures
attack effect mitigation
CAESAIR
composability
computer security
Correlation
CPS
critical infrastructures
advanced persistent threats
cyber situational awareness
cyber threat intelligence acquisition
cyber threat intelligence analysis engine
cyber-physical systems
daily business operations
data analysis
equipment damage
Europe
financial loss
biblio
Time Pattern Analysis of Malware by Circular Statistics
Submitted by grigby1 on Tue, 02/06/2018 - 1:03pm
Circular statistics
Human behavior
Human Factors
malware
Metrics
pubcrawl
Resiliency
Scalability
Security Risk Estimation
time patterns
uniformity hypothesis test
biblio
Ransomware: The CryptoVirus Subverting Cloud Security
Submitted by grigby1 on Tue, 02/06/2018 - 12:54pm
security
malware
Metrics
pubcrawl
Ransomware
ransomware attack
ransomware vulnerabilities
Resiliency
Scalability
IT security specialists
security effectiveness
security threat
Servers
threats
ubiquitous computing
Ubiquitous Computing Security
ubiquitous environment
vulnerabilities
cloud threat mechanisms
business enterprises
cloud
Cloud architecture
Cloud Computing
cloud network
cloud platforms
Cloud Security
cloud technology
Business
computer architecture
computer viruses
Cryptography
CryptoVirus
disparate locations
Human behavior
Human Factors
information technology
biblio
Empowering convolutional networks for malware classification and analysis
Submitted by grigby1 on Tue, 01/23/2018 - 2:53pm
pattern classification
malware
Malware Analysis
malware analytics
malware classification
malware families
metadata
Metrics
Neural networks
malicious executable detection
PE files
portable executable files
privacy
pubcrawl
Resiliency
statistical analysis
statistical machine learning
Feedforward neural networks
convolutional networks
convolutional neural constructs
Data mining
disassembled malicious binary execution sequences
feature extraction
feature plain vectorization
feedforward neural constructs
feedforward neural nets
Convolutional codes
hierarchical feature extraction
Human behavior
information feature extraction
instruction n-grams convolution
invasive software
learning (artificial intelligence)
malicious executable classification
biblio
Improving the effectiveness and efficiency of dynamic malware analysis with machine learning
Submitted by grigby1 on Tue, 01/23/2018 - 2:52pm
malware
static analysis
sandbox environment
Resiliency
pubcrawl
privacy
Predictive models
pattern classification
Metrics
malware detection
malware classification
Malware Analysis
Analytical models
machine learning
learning (artificial intelligence)
invasive software
information extraction
Human behavior
feature extraction
Dynamic Malware Analysis
dynamic malware
Data mining
Cybersecurity
computer security
biblio
Static Analysis with Paragraph Vector for Malware Detection
Submitted by grigby1 on Tue, 01/23/2018 - 2:52pm
Human behavior
k-nearest neighbor algorithm
machine learning
malware
Malware Analysis
Metrics
paragraph vector
privacy
pubcrawl
Resiliency
static analysis
support vector machine
threat vectors
« first
‹ previous
…
41
42
43
44
45
46
47
48
49
…
next ›
last »