Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptomining
biblio
In-Browser Cryptomining for Good: An Untold Story
Submitted by grigby1 on Tue, 07/12/2022 - 2:10pm
resilience
Monero
Coinhive
bit-coin
codes
cryptojacking
cryptomining
Focusing
cryptocurrency
tools
Metrics
Ecosystems
Conferences
Resiliency
Human behavior
pubcrawl
Organizations
biblio
SoK: Cryptojacking Malware
Submitted by grigby1 on Tue, 07/12/2022 - 2:09pm
Systematics
in-browser
Host-based
blockchains
Pandemics
detection
bitcoin
cryptomining
cryptojacking
military computing
tools
resilience
Metrics
blockchain
malware
Industries
Resiliency
Human behavior
pubcrawl
news
Cryptomining and Cryptojacking - What Are They?
Submitted by dgoff on Wed, 02/24/2021 - 2:36pm
Cryptomining and Cryptojacking - What Are They?
cryptojacking
cryptomining
biblio
MinerRay: Semantics-Aware Analysis for Ever-Evolving Cryptojacking Detection
Submitted by grigby1 on Wed, 02/10/2021 - 12:12pm
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Cryptography
Runtime
Browsers
Semantics
Systematics
Hash functions
Focusing
cryptomining
cryptojacking
Webassembly
biblio
Is Cryptojacking Dead After Coinhive Shutdown?
Submitted by grigby1 on Wed, 02/10/2021 - 12:11pm
cryptocurrency
victims
malicious scripts
legal mining service
legal mining scripts
in-browser mining activities
in-browser mining
cryptojacking dead
cryptocurrency mining
coinhive shutdown
coinhive scripts
cryptomining
cryptojacking
Data mining
cyberattack
malicious script
Web sites
online front-ends
Computer crime
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
DeCrypto Pro
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
Long short-term memory
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
cyberattacks
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
Cryptography
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
biblio
Mitigation of Cryptojacking Attacks Using Taint Analysis
Submitted by grigby1 on Fri, 07/10/2020 - 12:08pm
Resiliency
malware
man-in-the-middle
man-in-the-middle attack
Metrics
mitigation
online front-ends
pubcrawl
resilience
malicious cryptocurrency mining
script characteristics
security of data
taint analysis
taint analysis method
threat model
Web site background
Web sites
abuse case
in-browsercryptojacking mitigation
Human Factors
Human behavior
Google Chrome
Data mining
cryptomining
cryptojacking
Cryptography
cryptocurrency
cross-site scripting
CPU usage
CPU resources
Central Processing Unit
Browsers
Attack Modeling