Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
dynamic analysis
biblio
Hybrid Firmware Analysis for Known Mobile and IoT Security Vulnerabilities
Submitted by grigby1 on Thu, 12/17/2020 - 2:02pm
mobile
static analysis
Software
security
robot operating systems
Resiliency
resilience
pubcrawl
policy-based governance
patch
Androids
machine learning
Libraries
IoT
Humanoid robots
Human Factors
Human behavior
Firmware Vulnerabilities
dynamic analysis
deep learning
biblio
Android gaming malware detection using system call analysis
Submitted by grigby1 on Tue, 11/17/2020 - 2:40pm
Androids
Operating systems security
system call analysis
malware game system calls
malicious gaming applications
malicious games
detection system
cloning applications
benign game system calls
Android operating systems
Android gaming malware detection system
Android Gaming Malware
computer games
Android (operating system)
Humanoid robots
Monitoring
resilience
Games
dynamic analysis
program diagnostics
invasive software
malware
Cloning
smart phones
mobile computing
composability
Resiliency
Metrics
pubcrawl
biblio
A Novel Machine Learning Based Malware Detection and Classification Framework
Submitted by aekwall on Mon, 10/26/2020 - 12:13pm
complex malware types
Predictive Metrics
computer systems
Feature Selection
dynamic analysis
feature selection algorithms
machine learning models
classification accuracy
accurate malware detection
analysis report
classification framework
malware samples
fine-grained classification
high detection
malware analysis framework
malware files
minimum computation cost
selection module
signature-based malware detection techniques
system activities
time progresses
Training
invasive software
machine learning algorithms
feature extraction
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
pattern classification
malware
machine learning
testing
privacy
Virtual machining
Malware Analysis
cuckoo sandbox
malware classification
malware detection
static and dynamic analysis
biblio
Insights into Malware Detection via Behavioral Frequency Analysis Using Machine Learning
Submitted by aekwall on Mon, 10/26/2020 - 12:11pm
known malware
malicious software
malicious activity
Microsoft Windows (operating systems)
machine learning models
behavioral frequency analysis
benign software
common defenses
common malware defenses
dynamic behavioral analysis
Predictive Metrics
Malware Behavioral Analysis
malware signature classifier
malware threat landscape
signature catalog
unknown malware
Windows API system function calls
zero-day
zero-day vulnerabilities
Metrics
malware detection
invasive software
machine learning algorithms
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
machine learning
malware
pattern classification
Analytical models
privacy
microsoft windows
Malware Analysis
application program interfaces
dynamic analysis
Software algorithms
biblio
IoT Malware Dynamic Analysis Profiling System and Family Behavior Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:11pm
family behavior analysis
Hidden Markov models
IoT malware
API call invocation
API hooking technique
automatic machine
Behavior Graph
conventional profiling methods
deployed IoT devices
virtual machines
family behavior graph
IoT malware dynamic analysis profiling system
IoT malware increases
profiling system adapts virtual machine introspection
QEMU
valuable IoT malware behavior
virtual machine introspection
Libraries
Big Data
Internet of Things
malware
invasive software
Resiliency
Human behavior
pubcrawl
Metrics
Inspection
privacy
Virtual machining
Malware Analysis
application program interfaces
dynamic analysis
Predictive Metrics
virtual machine
biblio
PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use
Submitted by aekwall on Mon, 10/26/2020 - 11:46am
formal verification
Linux Operating System Security
term rewriting
ROSA model checker
privileged open source programs
privilege escalation attacks
PrivAnalyzer
LLVM-based C/C++ compiler
Linux privileges
Linux privilege use
ChronoPriv
AutoPriv
operating systems
dynamic analysis
verification
static analysis
security
program compilers
Predictive Metrics
program diagnostics
Containers
Analytical models
tools
Metrics
composability
pubcrawl
Resiliency
Linux
Program processors
Access Control
security of data
biblio
SMSBotHunter: A Novel Anomaly Detection Technique to Detect SMS Botnets
Submitted by aekwall on Mon, 10/12/2020 - 11:43am
electronic messaging
Human Behavior and Cybersecurity
SMSBotHunter
SMS stealer botnets
SMS spammer botnets
SMS botnet
one-class classification
mobile botnets
detect SMS botnets
SMS messages
dynamic analysis
anomaly detection technique
Anomaly Detection
botnet
Training
internet
Cryptography
Mobile handsets
pubcrawl
Human behavior
feature extraction
mobile computing
invasive software
malware
Servers
biblio
Multiple Layered Security Analyses Method for Cryptocurrency Exchange Servicers
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
malicious attacks
telecommunication security
static analysis
smartphone apps
smart phones
Semantics
semantic analysis
security
Resiliency
pubcrawl
multiple layered security analyses method
Androids
internet
Humanoid robots
dynamic analysis
cryptocurrency exchangers
cryptocurrency exchange servicers
cryptocurrency
cryptocurrencies
Cross Layer Security
composability
business trading
biblio
Research and Application of APT Attack Defense and Detection Technology Based on Big Data Technology
Submitted by grigby1 on Fri, 08/07/2020 - 3:57pm
Big Data analysis technology
APT
Power Grid
dynamic analysis
network security risks
APT attack
Active Defense
active defense system
APT attack defense
APT attack detection sandbox technology
advanced persistent threat
controllable virtual environment
detection technology
heterogeneous data sources
high-risk Trojan horses
power information system security situation prediction
Situation Prediction
threat assessment
unknown malicious code
power system security
Anomaly Detection
pubcrawl
Human behavior
resilience
Resiliency
computer network security
Correlation
Scalability
power engineering computing
security
Communication networks
security threats
Big Data
telecommunication traffic
malware
invasive software
power grids
Metrics
biblio
TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
supervised classifiers
Metrics
neural nets
private clouds
program diagnostics
pubcrawl
ransomware samples
resilience
Resiliency
static analysis
malware
transfer learning
Trusted Computing
trusted malware signature generation method
TrustSign signature generation process
unsupervised classifier
Unsupervised Learning
VGG-19 neural network model
virtualisation
volatile memory
distribution time
Cloud Computing
cloud virtualization technology
convolutional neural networks
Cryptography
cryptojacking
cryptojacking attacks
deep feature transfer learning
deep learning
digital signatures
Automatic Signature Generation
dynamic analysis
fileless malware
high-level deep features
Human behavior
Human Factors
ImageNet dataset
in-browser cryptojacking attacks
inspection procedure
invasive software
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »