Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Malware Analysis
biblio
A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems
Submitted by grigby1 on Fri, 09/15/2017 - 11:03am
complex ICT systems
Computing Theory
Damage Assessment
graph theory
Human behavior
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
risk assessment
Security Metrics
biblio
Nonlinear Laplacian for Digraphs and Its Applications to Network Analysis
Submitted by grigby1 on Fri, 09/15/2017 - 11:03am
graph
graph theory
Human behavior
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
spectral
theory
biblio
Significance Analysis for Edges in a Graph by Means of Leveling Variables on Nodes
Submitted by grigby1 on Fri, 09/15/2017 - 11:03am
Centrality
graph theory
Human behavior
Malware Analysis
Metrics
network analysis
privacy
pubcrawl
Resiliency
biblio
Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph
Submitted by grigby1 on Fri, 09/15/2017 - 10:50am
Malware Analysis
semi-supervised learning
security
Scalability
Resiliency
pubcrawl
Metrics
malware mitigation
malware detection
Algorithm
label propagation
graph theory
edge detection
download activity graph
Data mining
composability
Bayesian inference
biblio
Advance Persistent Threat: Botnet
Submitted by grigby1 on Tue, 09/05/2017 - 1:19pm
Human behavior
Zombie
zero access
spyware
Scalability
robot network
Resiliency
pubcrawl
P2P botnet
Metrics
Malware Analysis
malware
advanced persistent threat
cyber-attack
cyber mass attack
composability
collaboration
bots
botnets
botnet
automated attack
APT
advanced persistent threats
biblio
Explicit Two-source Extractors and Resilient Functions
Submitted by grigby1 on Mon, 06/05/2017 - 12:25pm
Computing Theory
graph theory
Human behavior
Malware Analysis
Metrics
Pseudorandomness
pubcrawl
Ramsey graph
random key generation
Randomness Extractor
resilience
Resiliency
Resilient Function
Scalability
Two-Source Extractor
biblio
Dependency Graph Analysis and Moving Target Defense Selection
Submitted by grigby1 on Thu, 05/18/2017 - 2:44pm
attack graphs
attack surface
composability
Cybersecurity
dynamic defense
Dynamical Systems
graph theory
Malware Analysis
Metrics
moving target defenses
pubcrawl
Resiliency
biblio
Static Deadlock Detection for Concurrent Go by Global Session Graph Synthesis
Submitted by grigby1 on Wed, 05/17/2017 - 1:48pm
Communication safety
composability
Concurrent Go
deadlock freedom
graph theory
Human behavior
Malware Analysis
pubcrawl
Resiliency
Session types
static analysis
static code analysis
synthesis
type safety
biblio
A Lifecycle Based Approach for Malware Analysis
Submitted by BrandonB on Wed, 05/06/2015 - 2:58pm
malicious outbound propagation
Zero day attack
spontaneous attack
specification-based detection
signature-based approach
Signature based
Reconnaissance
Polymorphic
peer coordination
network surveillance
Monitoring
Metamorphic
Malware Analysis
malware
anomaly based approach
local reconnaissance
lifecycle based approach
invasive software
inbound scan
inbound attack
hiding techniques
egg download
Educational institutions
device infection
Computers
client-side exploit
attack preparation
file
Virtualization and Binary Centric Approach to Malware Analysis
Submitted by Katie Dey on Fri, 11/02/2012 - 9:56am. Contributor:
Heng Yin
ABSTRACT
SaTC Posters
Binary Analysis
Malware Analysis
Memory Forensics
Syracuse University
1054605
SaTC PI Meeting 2012
Academia
Poster
« first
‹ previous
…
7
8
9
10
11
12
13
14
15