Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware detection
biblio
POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints
Submitted by grigby1 on Mon, 07/24/2017 - 1:06pm
kernel introspection
malware detection
pubcrawl
Resiliency
Rootkits
Scalability
signature based defense
biblio
Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection
Submitted by grigby1 on Mon, 06/05/2017 - 11:33am
artificial intelligence security
composability
concept drift
Human behavior
malware detection
Metrics
probabilistic prediction
pubcrawl
Resiliency
biblio
Discriminative Models for Multi-instance Problems with Tree Structure
Submitted by grigby1 on Mon, 06/05/2017 - 11:33am
artificial intelligence security
Big Data
composability
computational intelligence
Human behavior
learning indicators of compromise
malware detection
Metrics
neural network
pubcrawl
Resiliency
user modeling
biblio
Discriminative Models for Multi-instance Problems with Tree Structure
Submitted by grigby1 on Tue, 03/07/2017 - 12:06pm
Big Data
learning indicators of compromise
malware detection
neural network
pubcrawl170201
user modeling
biblio
Back to the Future: Malware Detection with Temporally Consistent Labels
Submitted by Katie Dey on Mon, 04/11/2016 - 11:20am
Resilient Systems
Science of Security
Foundations
SURE Project
malware detection
Temporally consistent labels
Malware and Its Mitigation
biblio
AppContext: Differentiating Malicious and Benign Mobile App Behavior Under Context
Submitted by amyclay on Tue, 11/17/2015 - 10:58am
Science of Security
Human and Societal Aspects of Security and Privacy
malware detection
NSA SoS Lablets Materials
Science of Security
security-sensitive behavior
UIUC
UIUC
Human and Societal Aspects of Security and Privacy
NSA SoS Lablets Materials
Science of Human Circumvention of Security
file
AppContext Differentiating Malicious and Benighn Mobile App Behaviors Using Context
Submitted by amyclay on Tue, 11/17/2015 - 10:58am
Science of Security
malware detection
security-sensitive behavior
UIUC
Human and Societal Aspects of Security and Privacy
NSA SoS Lablets Materials
Science of Security
UIUC
Human and Societal Aspects of Security and Privacy
NSA SoS Lablets Materials
Science of Human Circumvention of Security
biblio
Malicious data classification using structural information and behavioral specifications in executables
Submitted by BrandonB on Tue, 05/05/2015 - 10:55am
Software
malwares
NtTrace
obfuscation technology
pattern classification
program diagnostics
security devices
signature database
signature-based detection system
malware detection system efficiency improvement
static analysis
structural information
Syntactics
system calls
threat detection
threat mitigation
underground Internet economy
zero-day malware detection
internet
antivirus
automated malicious programs
behavioral specifications
Classification algorithms
dynamic analysis
executable file
feature extraction
Information systems
Algorithm design and analysis
invasive software
malicious behavior extraction
malicious data classification
malicious software detection
malicious software mitigation
malware
malware detection
malware detection system effectiveness improvement
biblio
Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
Submitted by BrandonB on Mon, 05/04/2015 - 12:28pm
malware detection
transformation attacks
operating systems (computers)
obfuscation techniques
next-generation solutions
mobile malware threats
Mobile handsets
mobile devices
mobile computing
Mobile communication
mobile
malware transformation
android
malware authors
malware
invasive software
Humanoid robots
encryption
DroidChameleon
commercial mobile antimalware products
anti-malware
Androids
Android antimalware
profile
Jonathan Gloster
CPS Technologies
malware detection
Cybersecurity
situational awareness
« first
‹ previous
…
3
4
5
6
7
8
9
10
11