Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious apps
biblio
Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks
Submitted by grigby1 on Tue, 03/09/2021 - 2:22pm
mobile devices
ISCX botnet dataset
learning (artificial intelligence)
machine learning
machine learning classifiers
malicious apps
Metrics
mobile botnet detection
mobile computing
invasive software
mobile operating systems
pattern classification
program diagnostics
pubcrawl
resilience
Resiliency
smart phones
static app features
CNN-based approach
Android botnet detection
Android Botnets
Android platform
Androids
botnet
botnet apps
Botnet detection
botnets
Android (operating system)
CNN-based model
composability
convolutional neural nets
convolutional neural networks
deep learning
feature extraction
Forestry
Humanoid robots
biblio
Evaluation of Security and Privacy of Smartphone Users
Submitted by aekwall on Mon, 07/27/2020 - 12:19pm
Metrics
spying app
smart phones
smart phone users
smart phone operating systems
smart phone
security
Resiliency
pubcrawl
privacy concerns
privacy
operating systems (computers)
operating systems
operating system
mobile computing
Operating systems security
malware
malicious apps
iOS Security
ios
Humanoid robots
Human Factors
GPS
data privacy
Compositionality
Androids
Android device
Android (operating system)
android
biblio
AppDNA: App Behavior Profiling via Graph-Based Deep Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
malicious apps
Task Analysis
Resiliency
pubcrawl
privacy
Plagiarism
pattern classification
Neural networks
mobile computing
mobile applications behaviors
Metrics
malware detection
malware classification
Malware Analysis
malware
app behavior profiling
machine learning
learning (artificial intelligence)
invasive software
Human behavior
graph-encoding method
graph-based deep learning
graph theory
function-call-graph-based app profiling
feature extraction
encoding
benign apps
AppDNA
app recommendation
biblio
Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers
Submitted by Katie Dey on Mon, 08/06/2018 - 1:24pm
malicious apps
user devices
Training data
Training
Support vector machines
statistical analysis
smart phones
regression analysis
Random Forest
nonlinear classifiers
neural network
neural nets
malware
adversarial evasion attacks
machine learning
logistic regression
linear classifiers
learning (artificial intelligence)
invasive software
Humanoid robots
feature extraction
Androids
Android-based devices
Android Malware Detection
android malware classifiers
Extraction
biblio
Detection of transformed malwares using permission flow graphs
Submitted by grigby1 on Wed, 06/20/2018 - 12:49pm
privacy
malware variants
Measurement
Metrics
mobile computing
nontransformed malware
permission flow graph
permission flow graphs
permission framework
Malware Analysis
pubcrawl
resilience
Resiliency
signature based detection
smart phones
state-of-the-art graph similarity algorithm
transformed malware
vertex level
graph based similarity metrics
Android malware
Androids
attack surface
code level changes
control flow
detection accuracy
feature extraction
flow graphs
Android app
graph theory
Human behavior
Humanoid robots
invasive software
learning (artificial intelligence)
lightweight static Permission Flow Graph based approach
malicious apps
malware