Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
Document Engineering Issues in Malware Analysis
Submitted by grigby1 on Tue, 01/23/2018 - 2:52pm
analysis
Human behavior
malware
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
biblio
Evaluating Features and Effectiveness of Secure QR Code Scanners
Submitted by grigby1 on Tue, 01/23/2018 - 1:58pm
Browsers
Cryptography
cyber physical systems
Google
malware
Mobile communication
Phishing
pubcrawl
QR code scanner
QR codes
Resiliency
security
smartphone
Uniform resource locators
biblio
Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts
Submitted by grigby1 on Tue, 01/16/2018 - 5:34pm
malware sandboxes
wear-and-tear artifacts
Virtualization
Virtual machining
tools
statistical models
statistical analysis
spotless sandboxes
security
Scalability
sandbox evasion techniques
sandbox
Resiliency
pubcrawl
Metrics
Bare-metal Host
malware analysis systems
Malware Analysis
malware
invasive software
Instruments
Human Factors
evasion
Environment Aware Malware
dynamic analysis
Decision trees
data analysis
Companies
BIOS Security
biblio
TextDroid: Semantics-based detection of mobile malware using network flows
Submitted by K_Hooper on Wed, 01/10/2018 - 10:15am
Conferences
feature extraction
Human behavior
malware
Mobile communication
mobile computing
natural language processing
pubcrawl
Resiliency
Scalability
security
Support vector machines
biblio
Shellcode detector for malicious document hunting
Submitted by grigby1 on Wed, 12/20/2017 - 12:08pm
malicious documents
Web sites
Web site
tools
simple encryption method
shellcode detector
shellcode
pubcrawl
Portable document format
Phishing
open-source tools
object retrieval
network threat
malware
advanced persistent threat attacks
malicious document hunting
malicious document detector
information retrieval
Human Factors
Human behavior
feature extraction
encryption
Electronic mail
document handling
Detectors
Computer crime
APT attack techniques
advanced persistent threats
biblio
Fresh-Phish: A Framework for Auto-Detection of Phishing Websites
Submitted by grigby1 on Wed, 12/20/2017 - 12:07pm
Electronic mail
Human behavior
Human Factors
internet
Kernel
machine learning
malware
Phishing
pubcrawl
Support vector machines
TensorFlow
Uniform resource locators
biblio
Efficient Method for Analyzing Malicious Websites by Using Multi-Environment Analysis System
Submitted by K_Hooper on Wed, 12/20/2017 - 10:33am
multienvironment analysis system
Web sites
Web client environments
Web Browser Security
Uniform resource locators
system monitoring
security of data
Resiliency
Relays
pubcrawl
obfuscation code decoding
obfuscated javascript
multimodal analysis
Browsers
multi-environment analysis
Metrics
malware
malicious Web sites
internet
Human behavior
Electronic mail
dynamic analysis
drive-by download attack
Decoding
Data mining
data analysis
biblio
Malware Collection and Analysis
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
malware
University of Arizona
security
Resiliency
pubcrawl
National Science Foundation funded project
malware datasets
Malware Collection
Malware Analysis
Androids
invasive software
Information Reuse
Humanoid robots
feature extraction
Data mining
computer security
Big Data
biblio
IoT based ransomware growth rate evaluation and detection using command and control blacklisting
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
Servers
network security
physical devices
pubcrawl
Ransomware
ransomware attacks statistics
ransomware growth rate detection
Resiliency
Scalability
Metrics
statistical analysis
TCP/IP header extraction
TCP/IP traffic
telecommunication traffic
threatening ransomware attacks
transport protocols
Web proxy server
command and control blacklisting
malware
locky ransomware
IP networks
IoT environment
invasive software
internetworking
Internet of Things
internet
encryption
emerging ransomware families
Elliptic curve cryptography
detection using command
cyber-attack threat
Cryptowall ransomware attack detection model
computer network security
biblio
Automatic Application Identification from Billions of Files
Submitted by grigby1 on Tue, 12/12/2017 - 12:20pm
big data security metrics
aknn
application
Big Data
clustering
Compositionality
files
hsnw
KNN
malware
Metadata Discovery Problem
pubcrawl
Resiliency
Scalability
security
sketch
« first
‹ previous
…
42
43
44
45
46
47
48
49
50
…
next ›
last »