Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptojacking
news
Cryptomining and Cryptojacking - What Are They?
Submitted by dgoff on Wed, 02/24/2021 - 3:36pm
Cryptomining and Cryptojacking - What Are They?
cryptojacking
cryptomining
biblio
MinerRay: Semantics-Aware Analysis for Ever-Evolving Cryptojacking Detection
Submitted by grigby1 on Wed, 02/10/2021 - 1:12pm
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Cryptography
Runtime
Browsers
Semantics
Systematics
Hash functions
Focusing
cryptomining
cryptojacking
Webassembly
biblio
MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities
Submitted by grigby1 on Wed, 02/10/2021 - 1:12pm
hidden cryptocurrency mining activities
security
Resiliency
resilience
pubcrawl
online front-ends
MiNo
Metrics
malware
malicious mining activities
invasive software
internet
Human behavior
Web Browser Security
Hidden Cryptocurrency Mining
digital currencies
Data mining
cryptojacking
cryptocurrency mining
cryptocurrencies
computer resources
Coinhive
Coin Mining
Chrome Web browser add-on application
cash money
bitcoin
biblio
CryingJackpot: Network Flows and Performance Counters against Cryptojacking
Submitted by grigby1 on Wed, 02/10/2021 - 1:11pm
Data mining
performance counters
cryptojacking
network flows
security analytics
Clustering algorithms
clustering
Task Analysis
malware
feature extraction
Intrusion Detection
Cryptography
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Servers
biblio
Advanced Behavior-Based Technique for Cryptojacking Malware Detection
Submitted by grigby1 on Wed, 02/10/2021 - 1:11pm
malware
malicious mining
cryptojacking
behavioral analysis
Multicore processing
Ransomware
Cybercrime
Browsers
malware detection
Monitoring
Libraries
Cryptography
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
biblio
Is Cryptojacking Dead After Coinhive Shutdown?
Submitted by grigby1 on Wed, 02/10/2021 - 1:11pm
cryptocurrency
victims
malicious scripts
legal mining service
legal mining scripts
in-browser mining activities
in-browser mining
cryptojacking dead
cryptocurrency mining
coinhive shutdown
coinhive scripts
cryptomining
cryptojacking
Data mining
cyberattack
malicious script
Web sites
online front-ends
Computer crime
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Are You a Favorite Target For Cryptojacking? A Case-Control Study On The Cryptojacking Ecosystem
Submitted by grigby1 on Wed, 02/10/2021 - 1:10pm
Web sites
risk assessment
CryptoJacking websites
cryptojacking ecosystem
cryptojacking campaigns
compromised websites
Case-control study
browser-based mining
cryptojacking
cryptocurrency
Web servers
Hash functions
Cryptography
bitcoin
Semantics
privacy
Ecosystems
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
Data mining
biblio
Behavior-Based Detection of Cryptojacking Malware
Submitted by grigby1 on Wed, 02/10/2021 - 1:10pm
behavioral analysis
virtual machine environment
malicious mining
illegitimate profit
executable-type cryptojacking
detection program
decision tree algorithm
cybercriminals
cryptojacking malware
Cryptojacking detection
cryptojacking
CPU load
complex detection technique
browser-based cryptojacking
Data mining
behavior-based detection
Ransomware
Cybercrime
Decision trees
invasive software
Computer crime
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 2:38pm
DeCrypto Pro
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
Long short-term memory
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
cyberattacks
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
Cryptography
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
biblio
Ransomware Threat and its Impact on SCADA
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Ransom
Device Compromising
Downtime
Encrypting
human machine interface
ICs
Industrial Control Systems
industrial networks
industrial processes
Infected System
Locker
malicious software
Network
operation technology
Petya
programmable logic controllers
Data Mitigation
Ransomware
ransomware attack
Ransomware Deadline
Ransomware Incidents
Ransomware Prevention
Ransomware Strategies
Ransomware Taxonomy
ransomware threat
Ransomware Threating
Remote Terminal Units
SCADA systems
supervisory control and data acquisition
Threat report
WannaCry
cryptocurrency
invasive software
Cybersecurity
pubcrawl
Metrics
Resiliency
resilience
Human behavior
Computer crime
malware
Human Factors
control engineering computing
industrial control
information security
cybercrimes
production engineering computing
cryptojacking
business productivity
Coin Miner
critical infrastructure
critical infrastructures
Cryptor
Cyber Actor
cyber attack
cyber threat
cyber-attack incidents
cybercriminals
Data and System Access
Data Backup
Data Extortion
« first
‹ previous
1
2
3
4
next ›
last »