Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT malware
biblio
Poster: Flexible Function Estimation of IoT Malware Using Graph Embedding Technique
Submitted by grigby1 on Mon, 09/18/2023 - 4:33pm
malware
Signature Matching
IoT malware
directed graphs
Resiliency Coordinator
Malware Analysis
graph embedding
graph theory
source coding
pubcrawl
static analysis
Computers
estimation
privacy
Resiliency
resilience
Metrics
Human behavior
biblio
Cross Platform IoT-Malware Family Classification Based on Printable Strings
Submitted by grigby1 on Tue, 09/21/2021 - 3:57pm
Malware Analysis
Training
Task Analysis
static analysis
Resiliency
resilience
pubcrawl
privacy
Metrics
malware classication
computer security
malware
machine learning
IoT malware
Internet of Things
Human behavior
Ground penetrating radar
Geophysical measurement techniques
feature extraction
biblio
IoT Malware Dynamic Analysis Profiling System and Family Behavior Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:11pm
family behavior analysis
Hidden Markov models
IoT malware
API call invocation
API hooking technique
automatic machine
Behavior Graph
conventional profiling methods
deployed IoT devices
virtual machines
family behavior graph
IoT malware dynamic analysis profiling system
IoT malware increases
profiling system adapts virtual machine introspection
QEMU
valuable IoT malware behavior
virtual machine introspection
Libraries
Big Data
Internet of Things
malware
invasive software
Resiliency
Human behavior
pubcrawl
Metrics
Inspection
privacy
Virtual machining
Malware Analysis
application program interfaces
dynamic analysis
Predictive Metrics
virtual machine
biblio
A Honeypot with Machine Learning based Detection Framework for defending IoT based Botnet DDoS Attacks
Submitted by aekwall on Mon, 06/01/2020 - 10:43am
Protocols
learning (artificial intelligence)
machine learning
machine learning model
machine learning techniques
malware
malware detection
Metrics
network security
IoT security
pubcrawl
Resiliency
Scalability
Training
Zero-day attacks
Zero-Day DDoS Attack
zero-day DDoS attacks
Human Factors
Computer crime
computer network security
Data models
DDoS attack detection
detection framework
honey pots
honeypot-based approach
Human behavior
composability
Internet of Things
invasive software
IoT botnet DDoS attacks
IoT Botnets
IoT honeypot
IoT Honeypots
IoT malware