Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Malware Analysis
biblio
SysTaint: Assisting Reversing of Malicious Network Communications
Submitted by aekwall on Mon, 06/24/2019 - 2:40pm
botnet
communication protocol
Human behavior
Malware Analysis
Metrics
pubcrawl
Resiliency
software reverse engineering
Virtualization
biblio
Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism
Submitted by aekwall on Mon, 06/24/2019 - 2:40pm
attention mechanism
convolutional neural network
Human behavior
Malware Analysis
Metrics
pubcrawl
Resiliency
biblio
Defending IT Systems against Intelligent Malware
Submitted by grigby1 on Mon, 06/10/2019 - 2:02pm
privacy
malware binaries
malware classification
malware detection
malware families
malware images
malware variants
Metrics
neural nets
Malware Analysis
pubcrawl
resilience
Resiliency
Signatures
static analysis
Training
unsupervised deep neural networks
adversarial examples
malware
machine learning algorithms
machine learning
learning (artificial intelligence)
IT systems
invasive software
intelligent malware
Human behavior
generative adversarial networks
generative adversarial network
Gallium nitride
dynamic analysis
Classification algorithms
ART
Antivirus Software vendors
biblio
Graph-Based APT Detection
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
Image edge detection
Web interface
undocumented attacks
Servers
Resiliency
pubcrawl
Protocols
privacy
Organizations
Metrics
Malware Analysis
invasive software
advanced persistent threats
Human behavior
HTTP traffic
graph-based APT detection
graph theory
graph model
detection system
Browsers
Batch production systems
Approximation algorithms
antiviruses
biblio
AppDNA: App Behavior Profiling via Graph-Based Deep Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
malicious apps
Task Analysis
Resiliency
pubcrawl
privacy
Plagiarism
pattern classification
Neural networks
mobile computing
mobile applications behaviors
Metrics
malware detection
malware classification
Malware Analysis
malware
app behavior profiling
machine learning
learning (artificial intelligence)
invasive software
Human behavior
graph-encoding method
graph-based deep learning
graph theory
function-call-graph-based app profiling
feature extraction
encoding
benign apps
AppDNA
app recommendation
biblio
DLGraph: Malware Detection Using Deep Learning and Graph Embedding
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
Metrics
Windows application programming interface calls
Windows API calls
Trojan horses
static analysis
stacked denoising autoencoders
softmax regression
SDA
Resiliency
representation learning
pubcrawl
privacy
pattern classification
noise reduction
neural nets
microsoft windows
application program interfaces
malware detection
Malware Analysis
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding
function-call graphs
function-call graph
feature extraction
embedded vector
embedded systems
DLGraph
deep learning
combined feature vector classification
biblio
Identification of Distributed Malware
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
public domain software
malware writers
Metrics
mobile computing
Mobile handsets
multiple anti-virus apps
open source platform
personal data
privacy
pubcrawl
malware prevention
Resiliency
security
Servers
simple worms
smart phones
smartphone revolution
sophisticated DDOS
static analysis
technological complexities increase
generic viruses
Android malware
Android system
attackers
botnets
computer malware
computer viruses
distributed direction
distributed malware
fully functional portable computers
android
Google
graph matching algorithm
graph theory
Human behavior
inholding multiple applications
Labeling
malware
Malware Analysis
malware detection
biblio
TINET: Learning Invariant Networks via Knowledge Transfer
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
dependency construction
enterprise security system
entity embedding
graph theory
heterogeneous categorical event
Human behavior
invariant network
knowledge transfer
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
biblio
Behavior-Based Community Detection: Application to Host Assessment In Enterprise Information Networks
Submitted by grigby1 on Mon, 06/10/2019 - 1:58pm
Anomaly Detection
behavior modeling
community detection
Comparative Analysis
enterprise information network
entity embedding
graph theory
host assessment
Human behavior
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
biblio
Obfuscation Resilient Search Through Executable Classification
Submitted by grigby1 on Mon, 06/10/2019 - 1:58pm
bytecode analysis
bytecode search
Computing Theory and Resilience
Control Theory
deep learning
executable search
graph theory
Human behavior
Malware Analysis
Metrics
obfuscation resilience
privacy
pubcrawl
Resiliency
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »