Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
A Lifecycle Based Approach for Malware Analysis
Submitted by BrandonB on Wed, 05/06/2015 - 1:58pm
malicious outbound propagation
Zero day attack
spontaneous attack
specification-based detection
signature-based approach
Signature based
Reconnaissance
Polymorphic
peer coordination
network surveillance
Monitoring
Metamorphic
Malware Analysis
malware
anomaly based approach
local reconnaissance
lifecycle based approach
invasive software
inbound scan
inbound attack
hiding techniques
egg download
Educational institutions
device infection
Computers
client-side exploit
attack preparation
biblio
Behavioral analytics for inferring large-scale orchestrated probing events
Submitted by BrandonB on Wed, 05/06/2015 - 1:07pm
Internet traffic
telecommunication traffic
statistical techniques
statistical analysis
signal techniques
routable unallocated IP addresses
Probes
orchestration pattern
network security analysts
malware traffic
malware
malicious real darknet data
malicious activities
large-scale orchestrated probing events
IP networks
invasive software
computer network security
internet
information theory
information theoretical metrics
fuzzy set theory
fuzzy approaches
emergency response teams
early cyber attack warning
early cyber attack notification
data mining methods
Data mining
Cyberspace
cyber threat intelligence
cyber attack
coordination pattern
Conferences
biblio
Inferring Malware Family through Application Protocol Sequences Signature
Submitted by BrandonB on Wed, 05/06/2015 - 1:04pm
application protocol sequences signature
computer network security
Cryptography
cyber-threats
Databases
Engines
Feeds
invasive software
learning (artificial intelligence)
machine learning algorithm
malicious packets detection
malware
malware automatic dynamic analysis
malware traffic detection
network traffic
Protocols
biblio
Inferring Malware Family through Application Protocol Sequences Signature
Submitted by BrandonB on Wed, 05/06/2015 - 1:01pm
application protocol sequences signature
computer network security
Cryptography
cyber-threats
Databases
Engines
Feeds
invasive software
learning (artificial intelligence)
machine learning algorithm
malicious packets detection
malware
malware automatic dynamic analysis
malware traffic detection
network traffic
Protocols
biblio
TorWard: Discovery of malicious traffic over Tor
Submitted by BrandonB on Wed, 05/06/2015 - 12:56pm
malicious traffic discovery
Tor exit routers
Tor
telecommunication traffic
telecommunication network routing
spam
Servers
Ports (Computers)
Peer-to-peer computing
P2P traffic
Mobile handsets
malware
Bandwidth
malicious traffic categorization
Malicious Traffic
low-latency anonymous communication system
Logic gates
intrusion detection system
IDS alerts
IDS
DoS
denial-of-service attack traffic
Computers
computer network security
biblio
Assuming a State of Compromise: A Best Practise Approach for SMEs on Incident Response Management
Submitted by BrandonB on Wed, 05/06/2015 - 9:39am
best practices
Companies
Computer crime
Cybercrime
economic feasibility
enterprise IT security experts
Forensics
Incident Response
incident response management
IT security
malware
remediation
small and medium sized enterprises
small-to-medium enterprises
SME
biblio
Behavioral Malware Detection in Delay Tolerant Networks
Submitted by BrandonB on Wed, 05/06/2015 - 9:33am
DTN model
Silicon
short-range communication technologies
proximity malware
polymorphic malware
obfuscated malware
naive Bayesian model
modern mobile consumer electronics
mobile radio
Mathematical model
malware
invasive software
filtering theory
Equations
adaptive look ahead
dogmatic filtering
delay-tolerant-network model
Delay-tolerant networks
delay tolerant networks
Bluetooth
behavioral malware characterization
behavioral characterization
Bayesian methods
Bayesian malware detection
Bayesian filtering
Bayes methods
aging
biblio
Design, deployment and use of HTTP-based botnet (HBB) testbed
Submitted by BrandonB on Wed, 05/06/2015 - 9:23am
HTTP flooding
Web servers
Web access log
real time HTTP-based botnet
malware
invasive software
Intrusion Detection
Internet-connected computer programs
HTTP-GET flooding method
HTTP-based botnet
behavioural-based approaches
http bot traces
HBB testbed
Floods
distributed denial of service attacks
DDoS Attacks
Cyber Attacks
Computer crime
botnet detection systems
botnet
biblio
Spam Trapping System: Novel security framework to fight against spam botnets
Submitted by BrandonB on Wed, 05/06/2015 - 9:18am
prevent-then-detect approach
warfare kill zone
Unsolicited electronic mail
unsolicited e-mail
STS
static an analysis
spam trapping system
spam botnets
spam botnet detection
security framework
sandboxing principle
program diagnostics
airport check-in system
malware bot
malware
invasive software
intrusion detection system
dynamic analysis
defense-in-depth model
Cryptography
computational cost
Charge carrier processes
Airports
biblio
How can botnets cause storms? Understanding the evolution and impact of mobile botnets
Submitted by BrandonB on Wed, 05/06/2015 - 9:10am
malware
wireless links
service requests
quadratic growth
Peer-to-peer computing
node mobility
network bandwidth
mobility range
mobile services
mobile nodes
mobile networks
mobile malware
mobile computing
mobile botnets
botnet propagation storms
last chipper time
invasive software
Internet botnets
internet
exponential growth
epidemic modeling
distributed mechanism
denial-of-service impact
data forwarding
coordinated attacks
computer network security
compromised nodes
« first
‹ previous
…
46
47
48
49
50
51
52
53
54
next ›
last »