Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Malware Analysis
biblio
Graph-Based Malware Detection Using Opcode Sequences
Submitted by grigby1 on Mon, 02/07/2022 - 4:45pm
Histograms
Malware Analysis and Graph Theory
privacy
Predictive Metrics
Human behavior
Resiliency
encryption
feature extraction
graph-based detection
Hardware
static analysis
Image edge detection
malware
Malware Analysis
malware detection
Metrics
opcode analysis
Packed Malware
pubcrawl
resilience
biblio
Clustering Analysis of Email Malware Campaigns
Submitted by grigby1 on Mon, 02/07/2022 - 4:44pm
malware
Malware labeling
malware feature extraction
email campaigns
clustering analysis
Malware Analysis
Labeling
Task Analysis
Dynamic scheduling
tools
Data mining
Resiliency
resilience
Metrics
Human behavior
pubcrawl
feature extraction
privacy
biblio
EntropLyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics
Submitted by grigby1 on Mon, 02/07/2022 - 4:43pm
Big Data
malware characterization
entropy analysis
Android malware
Malware Analysis
malware classification
automation
data analysis
malware behavior
malware
privacy
Entropy
data privacy
batteries
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Automatic Generation of Different Malware
Submitted by grigby1 on Mon, 02/07/2022 - 4:43pm
Payloads
mobil malware
malware static analysis
malware dynamic analysis
automated malware generation
software development management
Malware Analysis
malware dataset
sockets
malware
privacy
static analysis
programming
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Pay Attention: Improving Classification of PE Malware Using Attention Mechanisms Based on System Call Analysis
Submitted by grigby1 on Mon, 02/07/2022 - 4:42pm
privacy
Predictive Metrics
malware classification
Human behavior
machine learning algorithms
malware
Malware Analysis
Metrics
Neural networks
Prediction algorithms
pubcrawl
resilience
Resiliency
static analysis
Training
Transformers
biblio
Cross Platform IoT-Malware Family Classification Based on Printable Strings
Submitted by grigby1 on Tue, 09/21/2021 - 3:57pm
Malware Analysis
Training
Task Analysis
static analysis
Resiliency
resilience
pubcrawl
privacy
Metrics
malware classication
computer security
malware
machine learning
IoT malware
Internet of Things
Human behavior
Ground penetrating radar
Geophysical measurement techniques
feature extraction
biblio
Combinatorial Code Classification Amp; Vulnerability Rating
Submitted by grigby1 on Tue, 09/21/2021 - 3:53pm
LSTM
SVE
static code analysis
Resiliency
resilience
random forests
pubcrawl
privacy
parametrized complexity
Metrics
Malware Analysis
malware
Bluetooth
Human behavior
graph theory
deep learning
Cybersecurity
Computers
Computer crime
Computational modeling
code2vec
cluster-editing
clique decomposition
biblio
Malware Detection for Industrial Internet Based on GAN
Submitted by grigby1 on Tue, 09/21/2021 - 3:53pm
internet
Training
Resiliency
resilience
pubcrawl
privacy
Metrics
malware detection
Malware Analysis
malware
adversarial sample
industrial internet
Human behavior
graph theory
Generators
generative adversarial networks
Generative Adversarial Nets
Gallium nitride
Detectors
biblio
"Digital Bombs" Neutralization Method
Submitted by grigby1 on Tue, 09/21/2021 - 3:52pm
malware
Weapons
static analysis
Resiliency
resilience
pubcrawl
privacy
Performance analysis
Metrics
Malware Analysis
Algorithms
Human behavior
graph theory
Grammar
dynamic control automaton
dynamic analysis
control graph
checkpoints
automata
Analytical models
biblio
Analysis and Modelling of Multi-Stage Attacks
Submitted by grigby1 on Tue, 09/21/2021 - 3:52pm
machine learning
tools
security
Resiliency
resilience
pubcrawl
privacy
multi-stage attacks
Metrics
Malware Analysis
Analytical models
Labeling
Human behavior
honeypot
graph theory
Engines
cyberattack
Computational modeling
Attack modelling
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »