Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Malware Analysis
biblio
Fast and Scalable Distributed Loopy Belief Propagation on Real-World Graphs
Submitted by grigby1 on Mon, 06/10/2019 - 1:58pm
distributed graph processing
graph theory
Human behavior
loopy belief propagation
Malware Analysis
Metrics
privacy
pubcrawl
real-world graphs
Resiliency
biblio
A Graph-Based Model for Malicious Software Detection Exploiting Domination Relations Between System-Call Groups
Submitted by grigby1 on Mon, 06/10/2019 - 1:58pm
Algorithms
Compositionality
detection
graph theory
graphs
Human behavior
malware
Malware Analysis
Predictive Metrics
privacy
pubcrawl
Resiliency
Scientific Computing Security
security
Systems
biblio
ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures
Submitted by grigby1 on Mon, 06/10/2019 - 1:58pm
android
Correlation
Cyber-Infrastructure
graph analysis
graph theory
Human behavior
malware
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
biblio
Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables
Submitted by aekwall on Mon, 03/04/2019 - 10:50am
Resiliency
pubcrawl
composability
Binary Analysis
Malware Analysis
software reverse engineering
Automated Secure Software Engineering
biblio
A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software
Submitted by grigby1 on Wed, 06/20/2018 - 12:57pm
Malware Analysis
static analysis
Resiliency
resilience
pubcrawl
program diagnostics
privacy
Phased arrays
pattern classification
Metrics
Malware Clustering
malware classification
antivirus software detection
malware
lightweight malware classification
internet
Human behavior
Electronic mail
dynamic analysis
Databases
Data mining
cyber threats
computer viruses
arrays
biblio
Machine Learning and Images for Malware Detection and Classification
Submitted by grigby1 on Wed, 06/20/2018 - 12:56pm
classification
clustering
computer vision
Human behavior
Image Processing
machine learning
Malware Analysis
malware classification
malware detection
Metrics
privacy
pubcrawl
resilience
Resiliency
biblio
Scalable Framework for Accurate Binary Code Comparison
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
maximum common subgraph
CG
comparison algorithm
empiric results heuristic method
exact matches
extensive binaries
forward slicing
functions matching process parallelization
heavily modified functions
high matching quality
IdaPro disassembler
main stages
matched vertices
matching process
call graph
old versions
PDG
practical applications
program dependence graph
programmatic changes
real world libraries
scalable framework
slightly modified functions
statically linked libraries
target program
unchanged modified functions
well-known bugs prevention
Libraries
graph theory
privacy
pubcrawl
Human behavior
invasive software
Algorithm design and analysis
tools
Semantics
Cloning
program diagnostics
Malware Analysis
resilience
Metrics
static analysis
Computer bugs
Resiliency
program debugging
Program slicing
Binary codes
accurate binary code comparison
backward slicing
binary code clone detection
Binary code comparison
binary files
Binnavi platform
calculated heuristics
biblio
Heterogeneous Malware Spread Process in Star Network
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
Malware Analysis
Steady-state
steady state infection
star network
SIS model
simulation
Silicon
Resiliency
resilience
pubcrawl
privacy
network theory (graphs)
Metrics
meta-stable state fraction
malware spread process
Analytical models
infected nodes
Human behavior
heterogeneous virus spread
heterogeneous SIS model
heterogeneous malware spread process
graph theory
finite size graph
extended N-intertwined model
epidemic threshold
Curing
computer viruses
Computational modeling
Artificial Neural Networks
biblio
Parallelization of Machine Learning Applied to Call Graphs of Binaries for Malware Detection
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
program compilers
machine learning algorithms
malware
Malware Analysis
malware detection
Metrics
OpenMP version
parallelization
privacy
machine learning
pubcrawl
resilience
Resiliency
shortest path graph kernel
SPGK
support vector machine
Support vector machines
SVM
graph theory
Binary Analysis
byte-level n-grams
call graphs
compiler intermediate representations
compiler techniques
dynamic trace analysis
Engines
feature extraction
adaptive learning-based techniques
graph-based program representations
graphics processing units
Heterogeneous computing
Human behavior
invasive software
Kernel
learning (artificial intelligence)
biblio
Event graphs for the observation of botnet traffic
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
information security
telecommunication traffic
statistical flow-based analysis
sensitive information
Resiliency
resilience
pubcrawl
privacy
network vulnerabilities
network resources
network event correlation method
Metrics
Malware Analysis
malware
Algorithm design and analysis
Image edge detection
Human behavior
host machines
graph theory
event graphs
cyber-crime campaigns
Correlation
computer security
computer network security
botnet traffic
botnet
bot programs
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »