Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph embedding
biblio
Detecting Malware Using Graph Embedding and DNN
Submitted by grigby1 on Mon, 09/18/2023 - 4:33pm
data structures
Resiliency Coordinator
feature vector
Malware Analysis
graph embedding
graph theory
Markov processes
Deep Neural Network
malware detection
malware
deep learning
privacy
Data models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
feature extraction
information security
biblio
Poster: Flexible Function Estimation of IoT Malware Using Graph Embedding Technique
Submitted by grigby1 on Mon, 09/18/2023 - 4:33pm
malware
Signature Matching
IoT malware
directed graphs
Resiliency Coordinator
Malware Analysis
graph embedding
graph theory
source coding
pubcrawl
static analysis
Computers
estimation
privacy
Resiliency
resilience
Metrics
Human behavior
biblio
An Insider Threat Detection Method Based on Heterogeneous Graph Embedding
Submitted by grigby1 on Fri, 08/25/2023 - 3:42pm
resilience
ITDD Model
Heterogeneous Graph of employees' logs
Behavioral sciences
Resiliency
graph embedding
Policy Based Governance
Big Data
Computational modeling
Data models
Conferences
insider threat
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
Insider Threat Detection
machine learning
feature extraction
biblio
Predicting Terror Attacks Using Neo4j Sandbox and Machine Learning Algorithms
Submitted by grigby1 on Fri, 03/17/2023 - 12:14pm
resilience
Neo4j Sandbox
Machine Learning Graph Database
relational database security
graph embedding
Terrorism
composability
Computational modeling
Resiliency
deep learning
Metrics
Human behavior
pubcrawl
Support vector machines
machine learning algorithms
relational databases
Predictive models
biblio
On the Impact of the Embedding Process on Network Resilience Quantification
Submitted by grigby1 on Tue, 09/20/2022 - 2:02pm
critical infrastructure
pubcrawl
Metrics
Topology
network topology
Extraterrestrial measurements
reliability theory
data analysis
scientific computing
Security Metrics
Computing Theory
graph embedding
Computational Topology
network resilience
Wasserstein Distance
WEGL
biblio
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
Submitted by grigby1 on Thu, 09/16/2021 - 4:04pm
resilience
vulnerability scanning
Virtual machining
virtual machine
software development management
security
Scientific cyberinfrastructure
Scientific Computing Security
Resiliency
Compositionality
pubcrawl
Metrics
Memory
Inspection
graph embedding
GitHub
genomics
Conferences
biblio
Gait Phase Segmentation Using Weighted Dynamic Time Warping and K-Nearest Neighbors Graph Embedding
Submitted by aekwall on Mon, 02/22/2021 - 1:46pm
Dynamic Time Warping
weighted dynamic time warping algorithm
self-collected IMU gait signals
neural network-based graph embedding scheme
k-nearest neighbors graph embedding
k-nearest neighbors algorithm
k-nearest neighbors
inertial measurement units
gait phase segmentation method
gait phase estimates
gait information
gait cycle
nearest neighbour methods
nearest neighbor search
diseases
gait analysis
graph embedding
Predictive Metrics
image segmentation
Measurement
neural nets
graph theory
pubcrawl
biblio
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
privacy
invasive software
IoT malware samples
learning (artificial intelligence)
malware
Malware Analysis
malware detection
Metrics
off-the-shelf adversarial attack methods
Internet of Things
pubcrawl
resilience
Resiliency
robust detection tools
security
static analysis
tools
adversarial learning
Human behavior
graph-based IoT malware detection systems
graph theory
graph embedding
graph analysis
generated adversarial sample
GEA approach
feature extraction
deep learning networks
deep learning
craft adversarial IoT software
control flow graph-based features
CFG-based features
benign sample
augmentation method
biblio
Graph Embedding Based Familial Analysis of Android Malware using Unsupervised Learning
Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
Malware Analysis
Unsupervised Learning
supervised learning
SRA
smart phones
similarity relationships
Semantics
security
Resiliency
resilience
pubcrawl
privacy
pattern clustering
pattern classification
Metrics
malware link network
analytical workload
malware
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding techniques
graph embedding
GefDroid
feature extraction
familial analysis
Face
detection algorithms
application program interfaces
Android malware
biblio
Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
static analysis challenge
program compilers
program diagnostics
pubcrawl
resilience
Resiliency
security of data
Semantics
Software
static analysis
program behavioral problems
static code analysis
static detection
static vulnerability detection
static vulnerability detectors
Training
vulnerabilities
vulnerability detection
vulnerable program
graph embedding
composability
Computer bugs
Compositionality
control-flow
control-flow-related vulnerabilities
Convolutional codes
feature extraction
general static analysis solutions
graph convolutional network
CFR vulnerabilities
graph embedding approach
graph theory
high-level control-flow information
high-level control-flow related vulnerabilities
Human behavior
learning (artificial intelligence)
machine-learning-based approaches
program analysis
1
2
next ›
last »