Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
dynamic analysis
biblio
Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
Submitted by grigby1 on Fri, 07/10/2020 - 1:07pm
Human Factors
Web sites
Web browser fingerprinting
Unsupervised Learning
static analysis
Resiliency
resilience
pubcrawl
Metrics
malicious JavaScript codes
Java
internet
in-browser cryptojacking
code complexities
Human behavior
economic analysis
dynamic analysis
dropzone cryptojacking server
cryptojacking scripts
cryptojacking attackers
cryptojacking
Cryptography
computer network security
codes
code-based categorization
biblio
Cuckoo’s Malware Threat Scoring and Classification: Friend or Foe?
Submitted by grigby1 on Fri, 03/27/2020 - 11:38am
malware detection
Virtual machining
victim host system
threat scoring
threat score
threat classification rating
threat classification
threat alert
severity classification
scoring classification
sandbox
microsoft windows
measured response
malware threat classification
malware sample
malware incident response
tools
Malware behavior analysis
malware behavior
malicious software
automated tools
dynamic analysis
cuckoo sandbox
sandboxing
invasive software
malware
pattern classification
composability
policy-based governance
pubcrawl
information security
collaboration
biblio
SafeCheck: Safety Enhancement of Java Unsafe API
Submitted by grigby1 on Fri, 03/27/2020 - 11:29am
Resiliency
memory safety
Metrics
openJDK bug system
policy-based governance
program debugging
Programming Language
pubcrawl
resilience
Memory Protection
Runtime
Safe Coding
Safety
safety enhancement
security of data
storage management
tools
unsafe crash patterns
Java core library
bytecode
bytecode verification
collaboration
Computer bugs
dynamic analysis
Human behavior
Human Factors
Java
application program interfaces
Java runtime
Java unsafe API
JVM crash
Libraries
low- level system code
Memoey Safety
memory checker
biblio
Machine Learning Based Ransomware Detection Using Storage Access Patterns Obtained From Live-forensic Hypervisor
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
Internet of Things devices
UK National Health Service
storage access patterns
static ransomware analysis
prevention systems
machine learning based ransomware detection
live-forensic hypervisor
live ransomware samples
large-scale cyber attacks
dynamic ransomware analysis
dynamic analysis
benign application
behavioral model
Zero-day attacks
invasive software
ransomware attacks
mobile devices
cloud services
machine learning
Metrics
Ransomware
composability
pubcrawl
Resiliency
learning (artificial intelligence)
cyber-physical systems
support vector machine
Support vector machines
biblio
Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
static analysis
Locky
program diagnostics
pubcrawl
Ransomware
ransomware pandemic prevention
SDHASH
Semantics
Similarity Preserving
SSDEEP
invasive software
Syntactics
System performance
Triaging
triaging performance
triaging ransomware
WannaCry
WannaCryptor
YARA rules
CryptoWall
Resiliency
Metrics
Fuzzy Cryptography
Cer-ber
Cerber
composability
Context-Triggered Piecewise Hashing
Cryptography
Scalability
cyberthreat hunting
data privacy
dynamic analysis
Engines
file organisation
Fuzzy Hashing
IM-PHASH
Import Hashing
biblio
DifFuzz: Differential Fuzzing for Side-Channel Analysis
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
dynamic analysis
predictability
Security Heuristics
unknown side-channel vulnerabilities
secret-dependent paths
secret program data
resource-guided heuristics
resource usage
resource consumption
Performance analysis
Java programs
fuzzing-based approach
DifFuzz
differential fuzzing
side-channel attacks
side-channel analysis
security of data
fuzzing
side-channel
Time factors
Instruments
execution time
program diagnostics
Java
Correlation
tools
vulnerability detection
pubcrawl
Resiliency
Cryptography
Scalability
biblio
Mathematical Modeling of the Security Management Process of an Information System in Conditions of Unauthorized External Influences
Submitted by aekwall on Mon, 02/17/2020 - 2:22pm
neural network
wavelet transforms
wavelet transform
unauthorized external influences
signal processing security
security of data
security management process
Resiliency
pubcrawl
privacy
Neural networks
Dynamical Systems
neural nets
Metrics
mathematical modeling
information system
impact
dynamic analysis
conflict
composability
adaptive response unit
biblio
Multi-Platform Authorship Verification
Submitted by grigby1 on Mon, 01/27/2020 - 12:28pm
author attributing
dynamic analysis
Email messaging
Facebook messaging
Human behavior
Human Factors
Metrics
pubcrawl
SMS messaging
static analysis
stylometry
stylometry biometric
Twitter messaging
biblio
Tracking Sensitive Information and Operations in Integrated Clinical Environment
Submitted by aekwall on Mon, 01/27/2020 - 10:28am
integrated Clinical Environment
sensitive information
complex ICE systems
data flow
data flow analysis framework
device interoperability
dynamic analysis
high-level supervisory apps
Ice
sensitive data
low-level communication middleware
medical cyber physical system
medical cyber-physical systems
medical devices
Publishing
sensitive operations
standardized framework
security
open systems
static analysis
medical information systems
middleware
interoperability
taint analysis
privacy
data flow analysis
standards
Metrics
composability
pubcrawl
performance evaluation
data privacy
security of data
biblio
VerifiedFT: A Verified, High-Performance Precise Dynamic Race Detector
Submitted by grigby1 on Thu, 12/05/2019 - 10:52am
clean slate
collaboration
Concurrency
Data Races
dynamic analysis
Human behavior
Human Factors
Metrics
Policy
Policy Based Governance
policy governance
pubcrawl
resilience
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »