Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Resiliency
biblio
GNN-Based Malicious Network Entities Identification In Large-Scale Network Data
Submitted by grigby1 on Mon, 09/18/2023 - 3:36pm
pubcrawl
Human behavior
Metrics
resilience
Resiliency
privacy
Databases
Manuals
malware
Buildings
Reliability
Task Analysis
graph theory
Malware Analysis
graph neural networks
Resiliency Coordinator
biblio
Malware Detection Approach Based on the Swarm-Based Behavioural Analysis over API Calling Sequence
Submitted by grigby1 on Mon, 09/18/2023 - 3:35pm
dynamic analysis
word embedding
API calling sequence
Ant Colony
Resiliency Coordinator
Behavioral sciences
ubiquitous computing
computer viruses
Malware Analysis
graph theory
machine learning
malware
Databases
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Organizations
biblio
Rotten Apples Spoil the Bunch: An Anatomy of Google Play Malware
Submitted by grigby1 on Mon, 09/18/2023 - 3:35pm
malware detection
manual analysis
Resiliency Coordinator
Behavioral sciences
codes
Malware Analysis
graph theory
software engineering
android
dataset
pubcrawl
malware
Payloads
Manuals
internet
privacy
Resiliency
resilience
Metrics
Human behavior
biblio
CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs
Submitted by grigby1 on Mon, 09/18/2023 - 3:35pm
deep learning
pubcrawl
Human behavior
Metrics
resilience
Resiliency
privacy
process control
flow graphs
malware
Measurement
Task Analysis
graph theory
Malware Analysis
graph neural networks
Resiliency Coordinator
biblio
Representation Learning with Function Call Graph Transformations for Malware Open Set Recognition
Submitted by grigby1 on Mon, 09/18/2023 - 3:34pm
malware
self-supervised learning
open set recognition
Resiliency Coordinator
representation learning
Costs
Malware Analysis
malware classification
graph theory
Task Analysis
Training
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Neural networks
security
biblio
Mal-Bert-GCN: Malware Detection by Combining Bert and GCN
Submitted by grigby1 on Mon, 09/18/2023 - 3:34pm
graph theory
Process grap
API Sequence
Resiliency Coordinator
GCN
BERT
Behavioral sciences
graph neural networks
Malware Analysis
malware detection
deep learning
Technological innovation
Semantics
malware
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Detection of Botnets in IoT Networks using Graph Theory and Machine Learning
Submitted by grigby1 on Mon, 09/18/2023 - 3:33pm
malware
PSI-Graph
function call graphs
exploratory data analysis
Resiliency Coordinator
Botnet detection
Malware Analysis
graph theory
Technological innovation
botnet
IoT
Market research
Internet of Things
static analysis
sensors
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
machine learning
information security
biblio
A Survey of Explainable Graph Neural Networks for Cyber Malware Analysis
Submitted by grigby1 on Mon, 09/18/2023 - 3:33pm
Cybersecurity
Resiliency Coordinator
Explainability
classification
Malware Analysis
graph neural networks
graph theory
Measurement
malware
Big Data
machine learning
telecommunication traffic
Computational modeling
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Detecting Malware Using Graph Embedding and DNN
Submitted by grigby1 on Mon, 09/18/2023 - 3:33pm
data structures
Resiliency Coordinator
feature vector
Malware Analysis
graph embedding
graph theory
Markov processes
Deep Neural Network
malware detection
malware
deep learning
privacy
Data models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
feature extraction
information security
biblio
Poster: Flexible Function Estimation of IoT Malware Using Graph Embedding Technique
Submitted by grigby1 on Mon, 09/18/2023 - 3:33pm
malware
Signature Matching
IoT malware
directed graphs
Resiliency Coordinator
Malware Analysis
graph embedding
graph theory
source coding
pubcrawl
static analysis
Computers
estimation
privacy
Resiliency
resilience
Metrics
Human behavior
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »