Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
signature based detection
biblio
A study to Understand Malware Behavior through Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:11am
Zero-day attacks
signature based detection
obfuscated malware
mutated malware
Malware Signature
Malware Packer
malware features
behavioral based malware signature
Histograms
Predictive Metrics
computer science
malware behavior
malware
Malware Analysis
static analysis
privacy
tools
Metrics
pubcrawl
Human behavior
Resiliency
feature extraction
invasive software
malware detection
biblio
Implementation of Blockchain Based Distributed Web Attack Detection Application
Submitted by grigby1 on Fri, 09/18/2020 - 1:07pm
firewalls
command injection attacks
Co
web-based attacks
Web servers
Web platforms
web attack detection application
Web attack detection
web application firewalls
Stakeholders
signature based detection method
signature based detection
Cryptography
blockchain based web attack detection model
Reliability
Metrics
smart contracts
composability
internet
Resiliency
resilience
pubcrawl
Distributed databases
blockchain
biblio
Detection of transformed malwares using permission flow graphs
Submitted by grigby1 on Wed, 06/20/2018 - 11:49am
privacy
malware variants
Measurement
Metrics
mobile computing
nontransformed malware
permission flow graph
permission flow graphs
permission framework
Malware Analysis
pubcrawl
resilience
Resiliency
signature based detection
smart phones
state-of-the-art graph similarity algorithm
transformed malware
vertex level
graph based similarity metrics
Android malware
Androids
attack surface
code level changes
control flow
detection accuracy
feature extraction
flow graphs
Android app
graph theory
Human behavior
Humanoid robots
invasive software
learning (artificial intelligence)
lightweight static Permission Flow Graph based approach
malicious apps
malware