Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
Analysis of DDoS-capable IoT malwares
Submitted by grigby1 on Mon, 12/04/2017 - 11:57am
botnets
Compositionality
Computer crime
IP networks
malware
Metrics
pubcrawl
Resiliency
taxonomy
biblio
Detecting mobile botnets through machine learning and system calls analysis
Submitted by grigby1 on Mon, 12/04/2017 - 11:57am
malware
threat minimization
system call analysis
statistical feature extraction
statistical analysis
self-generated dataset
Resiliency
pubcrawl
pattern detection
Monitoring
Mobile handsets
mobile environment
mobile computing
Mobile communication
mobile botnet detection
Metrics
anomalous behavior identification
machine learning algorithms
machine learning
legitimate application
learning (artificial intelligence)
invasive software
Internet security
internet
host-based approach
feature extraction
desktop domain
computer network security
Compositionality
close-to-reality scenario
botnets
anomaly-based approach
biblio
PayBreak: Defense Against Cryptographic Ransomware
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
composability
cyber crime
Human behavior
hybrid cryptosystem
key vault
malware
Metrics
pubcrawl
Ransomware
Resiliency
biblio
2entFOX: A framework for high survivable ransomwares detection
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
invasive software
security mechanisms
Security Awareness
Resiliency
ransomwares behaviour
ransomware detection
ransomware attacks
Ransomware
pubcrawl
Metrics
malwares
malware detection
Malware Analysis
malware
2entFOX
Human behavior
HSR
high survivable ransomwares detection
high survivable ransomware
feature extraction
Engines
Cryptography
computer architecture
composability
belief networks
behavioral detection
Bayesian belief network
Bayes methods
biblio
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
Intrusion Detection
user file encryption
user data
Resiliency
ransomware behavior analysis
ransomware attacks
Ransomware
pubcrawl
Monitoring
Metrics
malware
invasive software
Intrusion Detection Systems
antivirus
Human behavior
file decryption
Entropy
encryption
early-warning detection system
Data protection
CryptoLock
Cryptography
composability
behavioral analysis
behavior indicators
arrays
biblio
Detecting Ransomware with Honeypot Techniques
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
Ransomware
malware
malware form
Metrics
Microsoft file server resource manager feature
Monitoring
Network
network administrators
pubcrawl
invasive software
ransomware activity detection
ransomware attacks
ransomware detection
Resiliency
Servers
social engineering methods
Windows security logs
witness tripwire files
Electronic mail
bogus computer resources
composability
computer security
Computers
Cryptography
cyber security
decoy computers
detect
activity
EventSentry
file screening service
file servers
honeypot
honeypot techniques
Human behavior
illicit access detection
biblio
Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
OpenFlow
user data encryption
surveillance
software defined networking
Servers
SDN-based system design
Resiliency
real-time mitigation method
ransomware mitigation
Ransomware
Public key
pubcrawl
composability
network security
Metrics
malware
IP networks
internet
Human behavior
Forensics
encryption
CryptoWall case
Cryptography
computer network security
biblio
Ransomware Inside Out
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
Metrics
smart phones
security
Resiliency
ransomware functionality
Ransomware
pubcrawl
model checking
mobile environment
mobile computing
Mobile communication
android
malware
Java
invasive software
Humanoid robots
Human behavior
formal verification
formal methods
formal method
composability
Androids
biblio
Cyber ethics and cyber crime: A deep dwelved study into legality, ransomware, underground web and bitcoin wallet
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
pubcrawl
encryption
Human behavior
Information systems
internet
invasive software
legality
locker bot
malware
Metrics
Electronic mail
Ransomware
Resiliency
The Dark Net
Tor
trojan horse
Trojan horses
underground Web
Web threats
cryptolocker ransomware
bitcoin
bitcoin wallet
composability
Computer crime
Computers
consumer confidence
crypto virus
Cryptographic Protocols
Cryptography
Algorithm design and analysis
CTB locker
cyber crime
cyber ethics
cyber Laws
cyber wars
darknet
e-commerce
electronic commerce
biblio
Ransomware: Studying transfer and mitigation
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
malware
victimized random set
Transfer
Resiliency
Ransomware
random processes
pubcrawl
nonvictimized random set
mitigation
Metrics
Market research
composability
invasive software
Interviews
internet
Human behavior
education
demographics
cybercrimes
Cyber Crime Science
Cryptography
Computer crime
« first
‹ previous
…
43
44
45
46
47
48
49
50
51
…
next ›
last »