Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Privacy-invasive software
biblio
Malware Containment in Cloud
Submitted by grigby1 on Wed, 12/02/2020 - 1:14pm
graph neural networks
Trusted Computing
trust
smart contracts
pubcrawl
protection mechanisms
Privacy-invasive software
malware
invasive software
hyperledger
Human Factors
Human behavior
high risk trust assumptions
graph theory
blockchain
graph analytics
Dominance Frontier
Distributed databases
decentralized malware containment
Cryptography
contracts
containment process
Containment
Computing Theory
cloud computing environments
Cloud Computing
business processes
biblio
ScriptNet: Neural Static Analysis for Malicious JavaScript Detection
Submitted by aekwall on Mon, 11/30/2020 - 11:03am
LSTM
Internet-scale Computing Security
sequential processing layers
ScriptNet system
Privacy-invasive software
preinformant learning
PIL model
neural static analysis
Neural models
neural malicious JavaScript detection
JavaScript files
Internet-scale processing
discriminative training
computer infection threat vector
policy governance
deep learning model
malware
deep learning
program diagnostics
Java
Vectors
machine learning
Neural networks
neural nets
Metrics
malware detection
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
invasive software
biblio
A survey of zero-day malware attacks and its detection methodology
Submitted by grigby1 on Fri, 07/10/2020 - 12:08pm
invasive software
zero-days
zero-day malware attacks
security systems
Resiliency
resilience
pubcrawl
Privacy-invasive software
Metrics
malware outbreaks
malware developers
malware detection
malware
large-scale attacks
advanced persistent threats
Human Factors
Human behavior
end-point security solutions
Electronic mail
detection methodology
detection
cryptojacking
Cryptography
Code Obfuscation
botnets
botnet
APT
analysis