Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware variants
biblio
Defending IT Systems against Intelligent Malware
Submitted by grigby1 on Mon, 06/10/2019 - 1:02pm
privacy
malware binaries
malware classification
malware detection
malware families
malware images
malware variants
Metrics
neural nets
Malware Analysis
pubcrawl
resilience
Resiliency
Signatures
static analysis
Training
unsupervised deep neural networks
adversarial examples
malware
machine learning algorithms
machine learning
learning (artificial intelligence)
IT systems
invasive software
intelligent malware
Human behavior
generative adversarial networks
generative adversarial network
Gallium nitride
dynamic analysis
Classification algorithms
ART
Antivirus Software vendors
biblio
Comprehensive Behavior Profiling Model for Malware Classification
Submitted by grigby1 on Mon, 06/10/2019 - 1:02pm
Metrics
telecommunication traffic
specific traffic selection
security
Resiliency
resilience
pubcrawl
Protocols
privacy
Payloads
pattern classification
partial network behavior
network security
Network behavior profiling
network behavior based classification methods
appropriate countermeasures
malware variants
malware network activities
malware classification method
malware classification
malware
invasive software
Human behavior
feature extraction
Computers
computer network security
Computational modeling
comprehensive behavior profiling model
complex activities
behavior profiling models
biblio
EntropyVis: Malware classification
Submitted by grigby1 on Wed, 06/20/2018 - 11:55am
malicious Windows Portable Executable files
visualization analysis
visualization
Resiliency
resilience
pubcrawl
privacy
nearest neighbour methods
Metrics
malware writers
malware variants
malware similarity
malware features
malware classification
malware
Brightness
local entropy images
kNN algorithm
k-Nearest Neighbor classification algorithm
Jaccard index
invasive software
image classification
Human behavior
Generators
feature extraction
EntropyVis
entropy pixel images
Entropy
Data visualization
data visualisation
biblio
Detection of transformed malwares using permission flow graphs
Submitted by grigby1 on Wed, 06/20/2018 - 11:49am
privacy
malware variants
Measurement
Metrics
mobile computing
nontransformed malware
permission flow graph
permission flow graphs
permission framework
Malware Analysis
pubcrawl
resilience
Resiliency
signature based detection
smart phones
state-of-the-art graph similarity algorithm
transformed malware
vertex level
graph based similarity metrics
Android malware
Androids
attack surface
code level changes
control flow
detection accuracy
feature extraction
flow graphs
Android app
graph theory
Human behavior
Humanoid robots
invasive software
learning (artificial intelligence)
lightweight static Permission Flow Graph based approach
malicious apps
malware