Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware
biblio
Beyond technical data - a more comprehensive situational awareness fed by available intelligence information
Submitted by BrandonB on Tue, 05/05/2015 - 12:38pm
information collection fusion
vulnerability information
threat information
technical data
Solids
situational awareness
security of data
military information providers
military environment
malware
intelligence processing
intelligence information
intelligence
information sources
information resources
adversary capabilities
information categories
Decision Making
decision makers
cyber threats
cyber space
cyber intelligence
cyber incidents
cyber analysis
cyber
Context
civil information providers
civil environment
Charge coupled devices
Bibliographies
biblio
Malicious data classification using structural information and behavioral specifications in executables
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
Software
malwares
NtTrace
obfuscation technology
pattern classification
program diagnostics
security devices
signature database
signature-based detection system
malware detection system efficiency improvement
static analysis
structural information
Syntactics
system calls
threat detection
threat mitigation
underground Internet economy
zero-day malware detection
internet
antivirus
automated malicious programs
behavioral specifications
Classification algorithms
dynamic analysis
executable file
feature extraction
Information systems
Algorithm design and analysis
invasive software
malicious behavior extraction
malicious data classification
malicious software detection
malicious software mitigation
malware
malware detection
malware detection system effectiveness improvement
biblio
Defense on the Move: Ant-Based Cyber Defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:19am
Mobile communication
target tracking
Swarm Intelligence
Statistics
security of data
protected infrastructure
Particle swarm intelligence
optimisation
MTD
moving-target defense
mobile resilient defense
ant-based cyber defense
malware
digital ants
Detectors
defended systems
Database systems
Cyberspace
Cybersecurity
computer security
Computer crime
biblio
National Cyber Range Overview
Submitted by BrandonB on Tue, 05/05/2015 - 11:01am
NCR
virtual machines
US Department of Defense
traffic emulation
testing
test
security
resource management
range
computer network security
National Cyber Range
malware
DoD communication networks
Department of Defense
cyberspace security threats
cyberspace resiliency testing
Cyberspace
biblio
A context-sensitive approach for precise detection of cross-site scripting vulnerabilities
Submitted by BrandonB on Tue, 05/05/2015 - 10:41am
precise detection
XSS vulnerability
XSS attacks
Web application
vulnerability detection
taint analysis
standards
source code (software)
source code
software development life cycle
Software
social communication
Servers
sensitive information
security
Browsers
malware
malicious user
malicious operation
invasive software
internet
hypermedia markup languages
HTML
health services
financial transaction
defensive programming based HTML context-sensitive approach
cross-site scripting vulnerability
cross-site scripting
Context
biblio
Current issues and challenges on cyber security for industrial automation and control systems
Submitted by BrandonB on Tue, 05/05/2015 - 9:35am
control systems
Cyber incident
cyber security
cyber threat
IACS
IEC standards
industrial automation and control systems
industrial control
malware
production engineering computing
Protocols
security
security of data
Vulnerability
biblio
Inferring Malware Family through Application Protocol Sequences Signature
Submitted by BrandonB on Mon, 05/04/2015 - 2:42pm
application protocol sequences signature
computer network security
Cryptography
cyber-threats
Databases
Engines
Feeds
invasive software
learning (artificial intelligence)
machine learning algorithm
malicious packets detection
malware
malware automatic dynamic analysis
malware traffic detection
network traffic
Protocols
biblio
Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
Submitted by BrandonB on Mon, 05/04/2015 - 1:28pm
malware detection
transformation attacks
operating systems (computers)
obfuscation techniques
next-generation solutions
mobile malware threats
Mobile handsets
mobile devices
mobile computing
Mobile communication
mobile
malware transformation
android
malware authors
malware
invasive software
Humanoid robots
encryption
DroidChameleon
commercial mobile antimalware products
anti-malware
Androids
Android antimalware
biblio
Application H-Secure for mobile security
Submitted by BrandonB on Mon, 05/04/2015 - 1:16pm
mobile operating system
Graphical Password
graphical user interfaces
H-Secure application
invasive software
malicious code
malware
Mobile communication
mobile computing
Mobile handsets
free-download content
mobile operating systems
mobile security applications
open devices
personal data
private key cryptography
Servers
smart phones
unauthorized person
Web server
confidential file storage
Android (operating system)
Android smart phones
application stores
authentication
authorisation
business applications
business data
confidential business information
confidential data storage
AES Encryption and Decryption
data access
decryption process
destination servers
employee-owned device
encrypted file
encryption
encryption key
free-download apps
biblio
Counteracting security attacks in virtual machines in the cloud using property based attestation
Submitted by BrandonB on Fri, 05/01/2015 - 9:15am
cloud
malware
Rootkits
TPM attestation
Trusted Computing
Virtual machine monitors
Zero day attacks
« first
‹ previous
…
46
47
48
49
50
51
52
53
54
next ›
last »