Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware similarity
biblio
Evolved Similarity Techniques in Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:14am
malware function similarity techniques
Zeus malware
Zeus
Semantics
reverse engineering
Resiliency
Registers
pubcrawl
privacy
Predictive Metrics
Metrics
Manuals
malware similarity
malware samples
Malware Analysis
malware function pairs
malware family
malware evolution
malware authors
malware
invasive software
Human behavior
function call graph
evolved similarity techniques
evolved code
Databases
binary similarity
graph theory
biblio
Andro-Simnet: Android Malware Family Classification Using Social Network Analysis
Submitted by grigby1 on Mon, 06/10/2019 - 1:01pm
pubcrawl
malware similarity
malwares attack behavior pattern
metamorphic malware
Metrics
mobile computing
mobile devices
pattern classification
polymorphic malware
privacy
malware family network aggregation
resilience
Resiliency
signature-based malware detection method
social network analysis
Social network services
social networking (online)
static analysis
tactical characteristics
graph visualization
Android (operating system)
Android malware family classification
behavior-based detection
Classification algorithms
detection algorithms
efficient malware classification
feature extraction
Generators
Andro-Simnet
high classification accuracy
Human behavior
invasive software
k-fold cross-validation
machine learning
malware
malware classification
malware dataset
biblio
EntropyVis: Malware classification
Submitted by grigby1 on Wed, 06/20/2018 - 11:55am
malicious Windows Portable Executable files
visualization analysis
visualization
Resiliency
resilience
pubcrawl
privacy
nearest neighbour methods
Metrics
malware writers
malware variants
malware similarity
malware features
malware classification
malware
Brightness
local entropy images
kNN algorithm
k-Nearest Neighbor classification algorithm
Jaccard index
invasive software
image classification
Human behavior
Generators
feature extraction
EntropyVis
entropy pixel images
Entropy
Data visualization
data visualisation