Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
benign software
biblio
Evolutionary Computation for Improving Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:13am
program debugging
variable-strength covering arrays
software improvement
malicious code
individual software artifacts
GI-based bug repair
GI-based approach
genetic improvement
automated repair
automated malware analysis
benign software
Genetics
evolutionary computation
malicious software
Predictive Metrics
Servers
malware samples
Malware Analysis
genetic algorithms
software maintenance
privacy
tools
Metrics
pubcrawl
Human behavior
Resiliency
invasive software
security
malware
biblio
Insights into Malware Detection via Behavioral Frequency Analysis Using Machine Learning
Submitted by aekwall on Mon, 10/26/2020 - 11:11am
known malware
malicious software
malicious activity
Microsoft Windows (operating systems)
machine learning models
behavioral frequency analysis
benign software
common defenses
common malware defenses
dynamic behavioral analysis
Predictive Metrics
Malware Behavioral Analysis
malware signature classifier
malware threat landscape
signature catalog
unknown malware
Windows API system function calls
zero-day
zero-day vulnerabilities
Metrics
malware detection
invasive software
machine learning algorithms
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
machine learning
malware
pattern classification
Analytical models
privacy
microsoft windows
Malware Analysis
application program interfaces
dynamic analysis
Software algorithms
biblio
A graph theoretic approach to fast and accurate malware detection
Submitted by grigby1 on Wed, 06/20/2018 - 11:49am
Malware Analysis
unknown malware
storage space
storage management
Robustness
Resiliency
resilience
pubcrawl
privacy
obfuscation attacks
nonsignature malware detection schemes
Metrics
Markov processes
benign software
malware
invasive software
Human behavior
GZero
graph theory
graph theoretic approach
feature extraction
false positive rate
detection time
Databases
Complexity theory
biblio
Malsign: Threat Analysis of Signed and Implicitly Trusted Malicious Code
Submitted by grigby1 on Wed, 05/30/2018 - 2:55pm
PKCS
trusted software providers
Trusted Computing
threat analysis
targeted attacks
signing keys
signed malware
signed code
Servers
Scalability
Resiliency
pubcrawl
private key cryptography
private key
PKI Trust Models
PKI
benign software
Metrics
malware
Malsign
malicious code signing
invasive software
implicitly trusted malicious code
Human Factors
Human behavior
genuine software
digital signatures
Computer crime
Companies
code signing infrastructure
code signing
Browsers