Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malware detection
biblio
A survey of zero-day malware attacks and its detection methodology
Submitted by grigby1 on Fri, 07/10/2020 - 12:08pm
invasive software
zero-days
zero-day malware attacks
security systems
Resiliency
resilience
pubcrawl
Privacy-invasive software
Metrics
malware outbreaks
malware developers
malware detection
malware
large-scale attacks
advanced persistent threats
Human Factors
Human behavior
end-point security solutions
Electronic mail
detection methodology
detection
cryptojacking
Cryptography
Code Obfuscation
botnets
botnet
APT
analysis
biblio
A Honeypot with Machine Learning based Detection Framework for defending IoT based Botnet DDoS Attacks
Submitted by aekwall on Mon, 06/01/2020 - 9:43am
Protocols
learning (artificial intelligence)
machine learning
machine learning model
machine learning techniques
malware
malware detection
Metrics
network security
IoT security
pubcrawl
Resiliency
Scalability
Training
Zero-day attacks
Zero-Day DDoS Attack
zero-day DDoS attacks
Human Factors
Computer crime
computer network security
Data models
DDoS attack detection
detection framework
honey pots
honeypot-based approach
Human behavior
composability
Internet of Things
invasive software
IoT botnet DDoS attacks
IoT Botnets
IoT honeypot
IoT Honeypots
IoT malware
biblio
Applying Convolutional Neural Network for Malware Detection
Submitted by grigby1 on Mon, 04/06/2020 - 1:24pm
malware detection
Training
testing
Source code analysis
source code
Resiliency
resilience
pubcrawl
Predictive models
Personnel
network coding
network administrators
Metrics
malware renders conventional detection techniques
malware detection efficiency
binary code analysis
malware
machine learning
learning (artificial intelligence)
knowledge based systems
invasive software
internet
feature extraction
deep learning
cyber physical systems
Convolutional Neural Networks (CNN)
convolutional neural networks
convolutional neural nets
computer network security
composability
biblio
Cuckoo’s Malware Threat Scoring and Classification: Friend or Foe?
Submitted by grigby1 on Fri, 03/27/2020 - 10:38am
malware detection
Virtual machining
victim host system
threat scoring
threat score
threat classification rating
threat classification
threat alert
severity classification
scoring classification
sandbox
microsoft windows
measured response
malware threat classification
malware sample
malware incident response
tools
Malware behavior analysis
malware behavior
malicious software
automated tools
dynamic analysis
cuckoo sandbox
sandboxing
invasive software
malware
pattern classification
composability
policy-based governance
pubcrawl
information security
collaboration
biblio
A Robust Malware Detection System Using Deep Learning on API Calls
Submitted by grigby1 on Fri, 03/27/2020 - 10:37am
cuckoo sandbox
robust malware detection system
redundant API
Object oriented modeling
neural nets
massive malware
massive datasets
malware detection
computer security
component
BLSTM
API sequences
API calls
API
Logic gates
application program interfaces
sandboxing
invasive software
malware
composability
policy-based governance
pubcrawl
Neural networks
feature extraction
collaboration
learning (artificial intelligence)
deep learning
biblio
Analysis of Machine Learning Techniques for Ransomware Detection
Submitted by aekwall on Mon, 03/23/2020 - 12:25pm
malware detection
Resiliency
ransomware families
Ransomware
Random Forest
Scalability
pubcrawl
policy-based governance
pattern classification
Metrics
CICAndMal2017 dataset
machine learning-based ransomware detection
machine learning
learning (artificial intelligence)
invasive software
Human behavior
cryptology
computer networks
composability
classification methods
biblio
Bytecode Heuristic Signatures for Detecting Malware Behavior
Submitted by aekwall on Mon, 03/09/2020 - 10:13am
virtual machines
predictability
Security Heuristics
signature
reactive security solutions
proactive behavior heuristics
proactive approaches
malicious applications
heuristic
hash-based signatures
bytecode heuristic signatures
bytecode
behavior based detection
behavior
response time
Instruction sets
Monitoring
Computer languages
low performance overhead
Prototypes
malware behavior
computational complexity
Virtual machining
digital signatures
pubcrawl
Resiliency
invasive software
malware detection
security
malware
Scalability
biblio
Malware Detection Using Honeypot and Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 3:42pm
malware
Trojan Horse malware
threat vectors
SVM
Support vector machines
support vector machine
signature-based security systems
Scalability
Resiliency
pubcrawl
privacy
Metrics
Measurement
malware detection
Adware malware
machine learning
learning (artificial intelligence)
invasive software
Human Factors
honey pots
honeypot
firewalls
digital signatures
Decision trees
Decision Tree
computer viruses
computer malware
biblio
Peer Based Tracking Using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection
Submitted by grigby1 on Thu, 01/02/2020 - 1:41pm
pubcrawl
network analytics tools
Network Behavioural detection
network traffic analysis
network traffic behaviour
Next generation firewall
next generation firewalls
packet content
peer based tracking
Peer-to-peer computing
privacy
Protocols
multituple indexing
Scalability
single tuple flow types
standard IDS systems
standards
TCP/IP fields
telecommunication traffic
traditional firewalls
transport protocols
video streaming
Zeus botnet
Intrusion Detection Systems
botnet
command and control systems
computer network security
Data Streaming
expert system rule set
expert systems
flow connection concept
generated metadata
Human Factors
Indexes
Internet of Things
5-tuple flow tables
invasive software
IoT devices
IP networks
malicious behaviours
malicious network threats
malware
malware detection
meta data
multipeered ZeuS botnet
multiple 5 tuple communications
biblio
Deep in the Dark - Deep Learning-Based Malware Traffic Detection Without Expert Knowledge
Submitted by grigby1 on Thu, 01/02/2020 - 1:41pm
machine learning-based systems
Training
telecommunication traffic
Scalability
robust network security systems
raw-traffic feature representations
Raw Measurements
pubcrawl
privacy
pattern classification
networking attacks
network traffic
network security applications
malware network traffic
malware detection
malware
Expert Systems and Privacy
learning (artificial intelligence)
invasive software
Human Factors
feature extraction
expert systems
expert handcrafted features
deep learning-based malware traffic detection
deep learning models
deep learning
Data models
computer network security
computer architecture
classification
Analytical models
Human behavior
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »