Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer malware
biblio
A Conceptual Direction on Automatically Evolving Computer Malware using Genetic and Evolutionary Algorithms
Submitted by grigby1 on Tue, 03/09/2021 - 2:06pm
genetic algorithms
security
Scalability
Resiliency
resilience
pubcrawl
Proactive Defence
Metrics
malware creation
malware
Mal-ware Analysis
invasive software
internet
Human behavior
artificial ecosystem
evolutionary computing
evolutionary computation
Evolutionary algorithms
cyber world
cyber security
computing devices
computer malware
co-evolutionary predator-prey framework
BIOS
biologically inspired computing
Bio-inspired computing
artificial world
biblio
Malware Detection Using Honeypot and Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 3:42pm
malware
Trojan Horse malware
threat vectors
SVM
Support vector machines
support vector machine
signature-based security systems
Scalability
Resiliency
pubcrawl
privacy
Metrics
Measurement
malware detection
Adware malware
machine learning
learning (artificial intelligence)
invasive software
Human Factors
honey pots
honeypot
firewalls
digital signatures
Decision trees
Decision Tree
computer viruses
computer malware
biblio
Identification of Distributed Malware
Submitted by grigby1 on Mon, 06/10/2019 - 12:59pm
public domain software
malware writers
Metrics
mobile computing
Mobile handsets
multiple anti-virus apps
open source platform
personal data
privacy
pubcrawl
malware prevention
Resiliency
security
Servers
simple worms
smart phones
smartphone revolution
sophisticated DDOS
static analysis
technological complexities increase
generic viruses
Android malware
Android system
attackers
botnets
computer malware
computer viruses
distributed direction
distributed malware
fully functional portable computers
android
Google
graph matching algorithm
graph theory
Human behavior
inholding multiple applications
Labeling
malware
Malware Analysis
malware detection