Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware detection
biblio
Effective of Obfuscated Android Malware Detection using Static Analysis
Submitted by grigby1 on Wed, 09/20/2023 - 10:51am
Metrics
system protection
static analysis
risk value
Resiliency
resilience
pubcrawl
privacy
operating systems
Android operating system
malware detection
Malware Analysis
malware
Human behavior
hash
Data Security
data privacy
Behavioral sciences
biblio
Rotten Apples Spoil the Bunch: An Anatomy of Google Play Malware
Submitted by grigby1 on Mon, 09/18/2023 - 4:35pm
malware detection
manual analysis
Resiliency Coordinator
Behavioral sciences
codes
Malware Analysis
graph theory
software engineering
android
dataset
pubcrawl
malware
Payloads
Manuals
internet
privacy
Resiliency
resilience
Metrics
Human behavior
biblio
Mal-Bert-GCN: Malware Detection by Combining Bert and GCN
Submitted by grigby1 on Mon, 09/18/2023 - 4:34pm
graph theory
Process grap
API Sequence
Resiliency Coordinator
GCN
BERT
Behavioral sciences
graph neural networks
Malware Analysis
malware detection
deep learning
Technological innovation
Semantics
malware
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Detecting Malware Using Graph Embedding and DNN
Submitted by grigby1 on Mon, 09/18/2023 - 4:33pm
data structures
Resiliency Coordinator
feature vector
Malware Analysis
graph embedding
graph theory
Markov processes
Deep Neural Network
malware detection
malware
deep learning
privacy
Data models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
feature extraction
information security
biblio
The Application of 1D-CNN in Microsoft Malware Detection
Submitted by grigby1 on Fri, 12/23/2022 - 11:55am
deep learning
feature extraction
Neural networks
pubcrawl
Metrics
Resiliency
Databases
composability
malware
network security
malware detection
Semantics
Windows Operating System Security
1D-CNN
feature engineering
LightGBM
biblio
Objection!: Identifying Misclassified Malicious Activities with XAI
Submitted by grigby1 on Thu, 12/01/2022 - 5:09pm
feature extraction
machine learning
security
pubcrawl
resilience
Resiliency
Conferences
Scalability
Object recognition
malware
malware detection
Cyberspace
malicious website detection
xai
biblio
Remote Non-Intrusive Malware Detection for PLCs based on Chain of Trust Rooted in Hardware
Submitted by grigby1 on Tue, 09/20/2022 - 2:14pm
malware detection
false trust
hardware root-of-trust
Hardware performance counters
Resiliency
JTAG
rootkit
Semantics
Kernel
pubcrawl
Linux
malware
real-time systems
Scalability
performance evaluation
Hardware
resilience
policy-based governance
biblio
Securing Remote Access Networks Using Malware Detection Tools for Industrial Control Systems
Submitted by aekwall on Thu, 06/09/2022 - 11:39am
industrial control
scalable systems
remote access trojans
Rats
Purdue control hierarchy
operational technology
hash calculation
Availability
integrity
Object recognition
integrated circuits
malware detection
telecommunication traffic
Smart homes
Industrial Control Systems
confidentiality
Resiliency
Scalability
pubcrawl
tools
biblio
Mining String Feature for Malicious Binary Detection Based on Normalized CNN
Submitted by aekwall on Tue, 04/19/2022 - 11:19am
Communication Systems
deep learning
tools
feature extraction
machine learning
Conferences
Learning systems
Resiliency
composability
malware
malware detection
pubcrawl
normalized CNN
string feature
Cross Layer Security
biblio
Federated Machine Learning Architecture for Searching Malware
Submitted by grigby1 on Mon, 03/14/2022 - 12:15pm
malware detection
ML–computing
mathematical models
malware sandbox
logic-vector analysis
federated machine learning
cloud–edge computing
cloud sandbox
signature
cyber-physical system
Policy Based Governance
computer architecture
sandboxing
malware
composability
Computational modeling
Analytical models
collaboration
pubcrawl
machine learning
Training
1
2
3
4
5
6
7
8
9
…
next ›
last »