Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
volatile memory
biblio
TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning
Submitted by grigby1 on Fri, 07/10/2020 - 12:08pm
supervised classifiers
Metrics
neural nets
private clouds
program diagnostics
pubcrawl
ransomware samples
resilience
Resiliency
static analysis
malware
transfer learning
Trusted Computing
trusted malware signature generation method
TrustSign signature generation process
unsupervised classifier
Unsupervised Learning
VGG-19 neural network model
virtualisation
volatile memory
distribution time
Cloud Computing
cloud virtualization technology
convolutional neural networks
Cryptography
cryptojacking
cryptojacking attacks
deep feature transfer learning
deep learning
digital signatures
Automatic Signature Generation
dynamic analysis
fileless malware
high-level deep features
Human behavior
Human Factors
ImageNet dataset
in-browser cryptojacking attacks
inspection procedure
invasive software
biblio
Hardware-Based Memory Acquisition Procedure for Digital Investigations of Security Incidents in Industrial Control Systems
Submitted by grigby1 on Thu, 05/09/2019 - 9:47am
reliable code
malware
memory contents collecting
operating system
operating systems
operating systems (computers)
production engineering computing
pubcrawl
Reliability
malicious software functions
resilience
Resiliency
resulting contents
Scalability
scalable
security incidents
software methods
volatile memory
guaranteed reliability
attacked computer
comprehensive solutions
computer security
continuous monitoring systems
control engineering computing
data collection procedure
digital investigations
forensic
Operating systems security
hardware-based memory acquisition procedure
ICs
industrial control
Industrial Control Systems
information security
integrated circuits
invasive software