Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Malware Analysis
biblio
An Efficient Malware Detection Technique Using Complex Network-Based Approach
Submitted by grigby1 on Tue, 09/21/2021 - 3:52pm
Application program interface
call transition matrix
centrality metric
complex network
graph theory
Human behavior
machine learning classifier
Malware Analysis
Metrics
privacy
pubcrawl
resilience
Resiliency
biblio
A Semi-Supervised Learning Scheme to Detect Unknown DGA Domain Names Based on Graph Analysis
Submitted by grigby1 on Tue, 09/21/2021 - 3:51pm
Metrics
supervised learning
Semisupervised learning
security
reverse engineering
Resiliency
resilience
pubcrawl
privacy
Prediction algorithms
botnet
Malware Analysis
malware
machine learning
Human behavior
graph theory
graph analysis
feature extraction
DGA
biblio
Automatically Generating Malware Summary Using Semantic Behavior Graphs (SBGs)
Submitted by grigby1 on Tue, 09/21/2021 - 3:51pm
Malware Analysis
Semantics
semantic behavior graph
Resiliency
resilience
pubcrawl
privacy
microsoft windows
Metrics
malware summary
behavior association
malware
Human behavior
Heuristic algorithms
Grippers
graph theory
feature extraction
Data mining
behavior description
biblio
LGMal: A Joint Framework Based on Local and Global Features for Malware Detection
Submitted by grigby1 on Tue, 09/21/2021 - 3:51pm
malware detection
static analysis
Smart City
smart cities
Semantics
Resiliency
resilience
pubcrawl
privacy
Metrics
convolutional neural network
Malware Analysis
malware
Human behavior
graph theory
graph convolutional networks
feature extraction
Data mining
convolutional neural networks
biblio
A Malware Similarity Analysis Method Based on Network Control Structure Graph
Submitted by grigby1 on Tue, 09/21/2021 - 3:51pm
pubcrawl
Training
Strain
software engineering
Software algorithms
similarity analysis
Resists
Resiliency
resilience
control branch point
privacy
network control structure graph
Metrics
Malware Analysis
malware
Human behavior
graph theory
feature extraction
biblio
Analysis of Malware Prediction Based on Infection Rate Using Machine Learning Techniques
Submitted by aekwall on Tue, 09/21/2021 - 11:09am
Malware Analysis
Predictive Metrics
neural network
Microsoft malware dataset
malware prediction
machine learning algorithm
lgbm
k-fold
Decision trees
Decision Tree
Neural networks
malware
Prediction algorithms
privacy
Human behavior
Resiliency
pubcrawl
machine learning algorithms
Training
Predictive models
biblio
A framework for automated dynamic malware analysis for Linux
Submitted by aekwall on Tue, 09/21/2021 - 11:09am
Hardware
tools
Virtual machine monitors
Virtual machining
Linux
Virtualization
pubcrawl
Resiliency
Human behavior
privacy
malware
dynamic analysis
Malware Analysis
computer security
sandbox
Predictive Metrics
biblio
A Malware Detection Approach Using Malware Images and Autoencoders
Submitted by aekwall on Tue, 09/21/2021 - 11:08am
Task Analysis
pubcrawl
Resiliency
Human behavior
privacy
Training data
malware
malware detection
Sensor Systems
Malware Analysis
autoencoders
Labeling
malware images
supervised learning
Unsupervised Learning
Predictive Metrics
biblio
Forensic Malware Identification Using Naive Bayes Method
Submitted by aekwall on Tue, 09/21/2021 - 11:08am
machine learning
Predictive Metrics
static analysis
Portable Executable
Naive Bayes
API Call Sequence
Malware Analysis
dynamic analysis
malware
Containers
privacy
Human behavior
Resiliency
pubcrawl
feature extraction
operating systems
tools
biblio
Malware Analysis using Machine Learning and Deep Learning techniques
Submitted by aekwall on Tue, 09/21/2021 - 11:08am
Neural networks
deep learning
feature extraction
machine learning
pubcrawl
Resiliency
Human behavior
privacy
Manuals
malware
Malware Analysis
Inspection
malware detection
Predictive Metrics
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »