Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
Cypider: Building Community-based Cyber-defense Infrastructure for Android Malware Detection
Submitted by grigby1 on Mon, 03/20/2017 - 11:24am
android
android encryption
collaboration
community detection
encryption
Fingerprinting
Human behavior
malware
Metrics
pubcrawl
Resiliency
Scalability
signature based defense
biblio
Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection
Submitted by grigby1 on Mon, 03/20/2017 - 8:43am
android
android encryption
Big Data
big data security
big data security metrics
Human behavior
learning
machine
malware
Metrics
pubcrawl
Resiliency
Scalability
security
biblio
WristSnoop: Smartphone PINs prediction using smartwatch motion sensors
Submitted by grigby1 on Wed, 03/08/2017 - 1:46pm
Pins
WristSnoop
wearable computing
wearable computers
watches
Vegetation
smartwatches
smartwatch motion sensors
smartphone PIN prediction
smart phones
sensors
security risks
pubcrawl170115
accelerometer
PIN prediction
p-i-n diodes
numeric keypad entries
motion measurement
Mobile Security
mobile malware
malware
keystroke inference
gyroscopes
gyroscope
Accelerometers
biblio
Scalable Honeypot Architecture for Identifying Malicious Network Activities
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
IP networks
virtualized environment
virtualisation
Servers
server machines
server honeypots
scalable honeypot architecture
pubcrawl170114
Ports (Computers)
peripheral security measures
operating systems
malware
malicious network activities identification
Kippo
J-Honeypot
advanced persistent attacks
honeypots
HoneyD
hacker activities
government organisations
Glastopf
file servers
Distributed honeypots
Dionaea
computer network security
Computer hacking
Computer crime
computer architecture
attack packets
biblio
Fast Mining of Large-Scale Logs for Botnet Detection: A Field Study
Submitted by grigby1 on Wed, 03/08/2017 - 1:32pm
information quality
Workstations
Servers
pubcrawl170112
proxy
normal data streams
network-based attack
mining
malwares
malware
logs
large-scale proxy log mining
invasive software
internet
information quantity
abnormal data streams
Heuristics
feature pattern
feature extraction
digital signatures
Data mining
computer network security
computer network behavioral analysis
Cloud Computing
C and C Servers
botnet life cycle
botnet detection methods
botnet
algorithmically generated domains
AGD
biblio
Detection of botnet by analyzing network traffic flow characteristics using open source tools
Submitted by grigby1 on Tue, 03/07/2017 - 12:42pm
pattern classification
fraud
invasive software
IP networks
malware
Mobile Botnet
Mobile communication
network traffic flow characteristics analysis
open source tools
financial threat
payload analysis
payload inspection
Payloads
phishing attack
pubcrawl170109
public domain software
Servers
telecommunication traffic
C&C channels
Bot
bot host classification
Bot master
bot masters
botnet
botnet activity detection
Botnet cloud
botnet detection technique
Bluetooth
click fraud
Computer crime
computer network security
Conferences
cyber threat
cybercriminal activities
DDoS
encrypted C&C channel
biblio
Using Dynamic Taint Approach for Malware Threat
Submitted by grigby1 on Tue, 03/07/2017 - 12:40pm
pubcrawl170109
Information Flow
intersuspicious modules
invasive software
malware
Malware behavioural analysis
malware infection
malware threat analysis
network threats
FSM
Servers
suspicious apps
taint checking tools
taint marking
threat analysis
trees (mathematics)
weighted spanning tree analysis scheme
Computer hacking
Android programs
attack sequence
behavioural analysis
cloud applications
Cloud Computing
cloud computing server
Computational modeling
Computer crime
Analytical models
cyber security attack
data tracking
defence capability
Dynamic taint propagation
dynamic taint propagation analysis model
finite state machine
finite state machines
biblio
Efficient spear-phishing threat detection using hypervisor monitor
Submitted by grigby1 on Tue, 03/07/2017 - 12:39pm
spear-phishing attack
malicious activities
malicious attachments
malware
Monitoring
PDF format structures
Portable document format
pubcrawl170109
Spear-phishing
invasive software
spear-phishing threat detection
transparent hypervisor monitor
unsolicited e-mail
URL links
user accounts
Virtual machine monitors
virtualisation
Virtualization
document handling
CIA
Cloud Computing
cloud-threat inspection appliance
commercial antivirus software
Computer crime
cyber security
cyber security threats
detection engine
antievasion sandbox
document prefiltering algorithm
Electronic mail
fake emails
hackers
hardware-assisted virtualization
hardware-assisted virtualization technology
hypervisor kernel
hypervisor monitor
biblio
Real-time classification of malicious URLs on Twitter using machine activity data
Submitted by grigby1 on Tue, 03/07/2017 - 12:39pm
malware
Web pages
user machines
Uniform resource locators
Twitter data
Twitter
Superbowl
social networking (online)
real-time systems
real-time malicious URL classification
pubcrawl170109
pattern classification
online social networks
Computer crime
malicious software behaviour
malicious software
malicious server
machine classification system
machine activity logs
machine activity data
invasive software
drive-by-download
Data models
cyber criminals
Cricket World Cup
biblio
Cloud-based Android botnet malware detection system
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
feature extraction
Vyatta
smart phones
Servers
runtime Android malware analysis
pubcrawl170109
open source development framework
multilayered algorithm
malware
Java
invasive software
Humanoid robots
Android (operating system)
digital crime groups
Cloud-based malware detection
cloud-based Android botnet malware detection system
Cloud Computing
Classification algorithms
botnet detection learning dataset
Androids
Android Sandbox
Android on VirtualBox
Android botnet family detection
Android botnet
« first
‹ previous
…
45
46
47
48
49
50
51
52
53
next ›
last »