Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
X-Swarm: Adversarial DRL for Metamorphic Malware Swarm Generation
Submitted by aekwall on Thu, 01/05/2023 - 4:07pm
pervasive computing
zero-day attack
Swarm Attack
metamorphic malware
Industry 4.0 Security
Endpoint protection
Deep Policy Reinforcement
Adversarial-RL
Swarm Intelligence
Computational modeling
Data mining
malware
Ransomware
Compositionality
Reinforcement learning
composability
pubcrawl
Conferences
biblio
Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware
Submitted by grigby1 on Fri, 12/23/2022 - 10:55am
operating systems
QSnatch
persistent IoT malware
notifications
IoT malware remediation
Behavioral sciences
customer satisfaction
user experience
Web and internet services
Windows Operating System Security
Internet of Things
malware
computer security
composability
IoT security
privacy
performance evaluation
Resiliency
Metrics
pubcrawl
biblio
Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files
Submitted by grigby1 on Fri, 12/23/2022 - 10:55am
feature extraction
machine learning
pubcrawl
Metrics
Resiliency
Conferences
composability
malware
Semantics
Prefetching
Forensics
Windows Operating System Security
malware classification
Malware Analysis
prefetch
biblio
The Application of 1D-CNN in Microsoft Malware Detection
Submitted by grigby1 on Fri, 12/23/2022 - 10:55am
deep learning
feature extraction
Neural networks
pubcrawl
Metrics
Resiliency
Databases
composability
malware
network security
malware detection
Semantics
Windows Operating System Security
1D-CNN
feature engineering
LightGBM
biblio
Objection!: Identifying Misclassified Malicious Activities with XAI
Submitted by grigby1 on Thu, 12/01/2022 - 4:09pm
feature extraction
machine learning
security
pubcrawl
resilience
Resiliency
Conferences
Scalability
Object recognition
malware
malware detection
Cyberspace
malicious website detection
xai
biblio
CARE: Lightweight Attack Resilient Secure Boot Architecture with Onboard Recovery for RISC-V based SOC
Submitted by aekwall on Thu, 12/01/2022 - 3:37pm
malware
Resilient Security Architectures
smart recovery
small embedded and IoT devices security system
RISC-V
HW/SW co-design
hardware and system security
attack resilient
Secure Boot
Hardware
Performance analysis
Prototypes
Resiliency
pubcrawl
tools
performance evaluation
Internet of Things
SoC
biblio
A predictive zero-day network defense using long-term port-scan recording
Submitted by grigby1 on Thu, 12/01/2022 - 1:20pm
computer architecture
Computer hacking
Servers
pubcrawl
Metrics
resilience
Resiliency
composability
malware
defense
Market research
Reconnaissance
Zero day attacks
Ports (Computers)
biblio
Investigation of Computer Incidents as an Important Component in the Security of Maritime Transportation
Submitted by grigby1 on Fri, 11/25/2022 - 4:48pm
Transportation
modern shipping
Policy Based Governance
pubcrawl
Reliability
resilience
Resiliency
reverse engineering
Scalability
Science of Security
security system
Software
tools
Metrics
automated information system
collaboration
composability
computer incident
computer security
cyber-attacks
forensic science
framework
Human behavior
Human Factors
information security
malware
biblio
Malware Detection and Security Analysis Capabilities in a Continuous Integration / Delivery Context Using Assemblyline
Submitted by grigby1 on Fri, 11/18/2022 - 1:49pm
Python
YARA
software analysis
PoetRAT
Malware Scoring
CI/CD
CCCS
Assemblyline
Security by Default
Ubuntu
detection
tools
malware
Computer crime
Scalability
Safety
Conferences
Resiliency
resilience
pubcrawl
security
risk management
biblio
Automatic Detection of Android Steganography Apps via Symbolic Execution and Tree Matching
Submitted by grigby1 on Thu, 10/20/2022 - 3:01pm
feature extraction
pubcrawl
Metrics
Conferences
privacy
composability
malware
network security
Steganography
frequency-domain analysis
codes
steganography detection
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »