Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
static analysis
biblio
Flubot Malware Hybrid Analysis on Android Operating System
Submitted by grigby1 on Wed, 09/20/2023 - 9:51am
Phishing
telecommunication traffic
static analysis
source coding
Servers
Resiliency
resilience
pubcrawl
privacy
Android malware
operating systems
Metrics
Malware Analysis
Hybrid Analysis
Human behavior
flubot malware
computer viruses
biblio
Effective of Obfuscated Android Malware Detection using Static Analysis
Submitted by grigby1 on Wed, 09/20/2023 - 9:51am
Metrics
system protection
static analysis
risk value
Resiliency
resilience
pubcrawl
privacy
operating systems
Android operating system
malware detection
Malware Analysis
malware
Human behavior
hash
Data Security
data privacy
Behavioral sciences
biblio
Investigation Malware Analysis Depend on Reverse Engineering Using IDAPro
Submitted by grigby1 on Wed, 09/20/2023 - 9:50am
pubcrawl
unsolicited e-mail
Trojan malware analysis
static analysis
source coding
social networking (online)
reverse engineering
Resiliency
resilience
disassembler
privacy
Metrics
Malware Analysis
malware
IDAPro
Human behavior
feature extraction
biblio
PDF Malware Analysis
Submitted by grigby1 on Wed, 09/20/2023 - 9:49am
privacy
Virtual machining
static analysis
Shell Scripting
security
ScriptAnalysis
Resiliency
resilience
pubcrawl
cuckoo sandbox
Portable document format
PDF malware
Monitoring
Metrics
Malware Analysis
malware
Human behavior
dynamic analysis
biblio
Detection of Botnets in IoT Networks using Graph Theory and Machine Learning
Submitted by grigby1 on Mon, 09/18/2023 - 3:33pm
malware
PSI-Graph
function call graphs
exploratory data analysis
Resiliency Coordinator
Botnet detection
Malware Analysis
graph theory
Technological innovation
botnet
IoT
Market research
Internet of Things
static analysis
sensors
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
machine learning
information security
biblio
Poster: Flexible Function Estimation of IoT Malware Using Graph Embedding Technique
Submitted by grigby1 on Mon, 09/18/2023 - 3:33pm
malware
Signature Matching
IoT malware
directed graphs
Resiliency Coordinator
Malware Analysis
graph embedding
graph theory
source coding
pubcrawl
static analysis
Computers
estimation
privacy
Resiliency
resilience
Metrics
Human behavior
biblio
Web Browser Extension Development of Structured Query Language Injection Vulnerability Detection Using Long Short-Term Memory Algorithm
Submitted by grigby1 on Fri, 04/14/2023 - 3:14pm
Compositionality
long short-term memory (LSTM)
browser extension
Browser Security
Resiliency
web security
SQL injection
Uniform resource locators
Web pages
pubcrawl
Browsers
Structured Query Language
deep learning
Classification algorithms
static analysis
resilience
Metrics
Human behavior
biblio
Effectiveness on C Flaws Checking and Removal
Submitted by grigby1 on Fri, 02/17/2023 - 4:42pm
Telecommunications
Code Correction
Buffer Overflow Vulnerabilities
Buffer overflows
software assurance
static analysis
Rail transportation
software security
embedded systems
pubcrawl
Computer languages
fuzzing
Memory management
Scalability
Software
Resiliency
resilience
biblio
SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros
Submitted by grigby1 on Fri, 02/17/2023 - 4:11pm
Forensics
Symbolic-Execution
Microsoft-Excel
Malware-Analysis
Computer-Security
obfuscation
policy governance
sandboxing
software reliability
collaboration
malware
static analysis
composability
privacy
Ecosystems
pubcrawl
security
biblio
Control flow integrity check based on LBR register in power 5G environment
Submitted by aekwall on Fri, 02/17/2023 - 9:41am
Detectors
LBR register
Control-flow protection
CFI
rop attacks
Costs
codes
process control
static analysis
Human Factors
Safety
composability
Resiliency
Scalability
pubcrawl
real-time systems
Internet of Things
1
2
3
4
5
6
7
8
9
…
next ›
last »