Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sandboxing
biblio
RansHunt: A Support Vector Machines Based Ransomware Analysis Framework with Integrated Feature Set
Submitted by grigby1 on Wed, 05/09/2018 - 1:53pm
ransomware families
malwares
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
RansHunt
Ransomware
ransomware analysis framework
malware
ransomware samples
ransomware variants
sandboxing
static analysis
static code features
static features
Support vector machines
Algorithm design and analysis
machine learning
learning (artificial intelligence)
invasive software
integrated feature set
individual analysis approach
hybrid cryptosystem
Heuristic algorithms
feature extraction
Electronic mail
dynamic analysis
cyber-crime
Cryptography
crypto-ransomwares
composability
collaboration
biblio
Fine-Grained Supervision and Restriction of Biomedical Applications in Linux Containers
Submitted by grigby1 on Wed, 05/09/2018 - 1:53pm
program libraries
medical administrative data processing
medical data processing
Monitoring
multidimensional biosignal recordings normalization
operating system
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
Process Supervision
Linux containers
pubcrawl
sandbox
sandboxing
security
security of data
security technologies
system call filtering
System Call Interception
Containers
application analysis
biomedical application restriction
biomedical data
Cloud Computing
collaboration
complex programs
composability
container portability
algorithm development
data analysis
distributed processing
docker-based container
external code repositories
fine-grained restricted environment
fine-grained supervision
Kernel
Linux
biblio
Predicting Zero-Day Malicious IP Addresses
Submitted by grigby1 on Mon, 03/26/2018 - 12:12pm
sandboxing
composability
defense
malicious ip prediction
Metrics
pubcrawl
Resiliency
Zero day attacks
zero day malware prediction
biblio
Transitioning Native Application into Virtual Machine by Using Hardware Virtualization Extensions
Submitted by grigby1 on Mon, 11/20/2017 - 11:31am
security
operating system service virtualization
Policy
policy-based governance
process maliciousness
process virtual machine
program flow control
pubcrawl
sandbox
sandboxing
operating system kernels
system call virtualization
untrusted application behaviour control
untrusted application behaviour monitoring
virtual machine equivalent isolation
virtual machines
Virtual machining
virtualisation
Virtualization
hardware virtualization extensions
composability
confined malicious application
execution overheads
file system access
Governance
Government
Hardware
Hardware virtualization
code vulnerabilities
isolation
Kernel
kernel operating system
Libraries
Linux
Linux process
Memory management
operating system
biblio
Securing IoT devices using JavaScript based sandbox
Submitted by grigby1 on Mon, 11/20/2017 - 11:31am
JavaScript sandbox
security of data
security
sandboxing
pubcrawl
program execution
policy-based governance
Policy
networking
composability
JavaScript
Java
IoT devices
IoT device security
Internet of Things
Government
Governance
biblio
Advanced Persistent Threat: New analysis driven by life cycle phases and their challenges
Submitted by grigby1 on Mon, 11/20/2017 - 11:31am
honeypots
underground market
UBA
Terminology
SIEM
security of data
security experts
security
sandboxing
pubcrawl
policy-based governance
Policy
Monitoring
Market research
life cycle phases
advanced persistent threat
highly skilled actors
Government
Governance
Electronic mail
delays
defence strategy
cyber-attacks
composability
compiled life cycle model
Biological system modeling
APT protection technologies
APT
advanced persistent threat attacks life cycle
biblio
PhishEye: Live Monitoring of Sandboxed Phishing Kits
Submitted by grigby1 on Mon, 11/20/2017 - 11:31am
composability
Governance
Government
Policy
policy-based governance
pubcrawl
sandboxing
biblio
An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment
Submitted by grigby1 on Mon, 11/13/2017 - 10:59am
Access Control
composability
Permission
pubcrawl
Resiliency
sandbox
sandboxing
Trusted Execution Environment
trusted platform modules
biblio
MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing
Submitted by grigby1 on Fri, 09/15/2017 - 10:10am
bare-metal analysis
Human behavior
Malware Analysis
malware classification
malware sandbox
Metrics
privacy
pubcrawl
Resiliency
sandboxing
biblio
ShieldFS: A Self-healing, Ransomware-aware Filesystem
Submitted by grigby1 on Tue, 05/30/2017 - 12:04pm
composability
pubcrawl
Resiliency
sandboxing
self-healing networks
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »