Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
system call
biblio
RSDS: Getting System Call Whitelist for Container Through Dynamic and Static Analysis
Submitted by grigby1 on Tue, 07/27/2021 - 11:32am
Security by Default
system call
seccomp
Whitelists
Docker
resilience
Kernel
Containers
Linux
static analysis
Scalability
Resiliency
pubcrawl
security
Cloud Computing
biblio
SASAK: Shrinking the Attack Surface for Android Kernel with Stricter “seccomp” Restrictions
Submitted by aekwall on Thu, 05/13/2021 - 10:37am
security
Kernel
Linux
Resiliency
pubcrawl
Metrics
internet
tools
sensors
Scalability
Prototypes
system call
attack surface
Android system
seccomp Mechanism
Shrinking
biblio
EagleEye: A Novel Visual Anomaly Detection Method
Submitted by aekwall on Mon, 10/12/2020 - 10:44am
Anomaly Visualization
Human Behavior and Cybersecurity
visual anomaly detection method
two-dimensional space
System Call Trace
system call
modified t-SNE
human eyes
EagleEyes efficiency
EagleEye view
dimensionality reduction
dimensional reduction
data depth
Australian Defence Force Academy Linux Dataset
Intrusion Detection
Human behavior
normal behaviors
abnormal behaviors
Two dimensional displays
Three-dimensional displays
data visualisation
principal component analysis
Data visualization
Mathematical model
pubcrawl
Linux
security of data
biblio
Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis
Submitted by aekwall on Mon, 02/17/2020 - 1:42pm
android
vulnerabilities detection approach
system call
security vulnerabilities detection
security bugs
malicious Android application
detection process
detection algorithm
cyber attackers
Android security vulnerabilities
Android operating systems
system calls
anomaly detection techniques
Compositionality
Android (operating system)
security
vulnerability detection
Measurement
security vulnerabilities
Computer bugs
Anomaly Detection
Correlation
Metrics
machine learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
invasive software
Software
biblio
Profile hidden Markov model for malware classification \#x2014; usage of system call sequence for malware classification
Submitted by grigby1 on Wed, 06/20/2018 - 11:55am
obfuscation
Trojan horses
tools
system call sequence
system call
Resiliency
resilience
pubcrawl
proteins
protein sequences
profile hidden markov model
privacy
pattern classification
obfuscation technique
bioinformatics
microsoft windows
Metrics
malware technology
malware files
malware classification
malware
invasive software
Human behavior
Hidden Markov models
Grippers
DNA sequences
DNA
biological informatics