Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
invasive software
biblio
Dynamic information-theoretic measures for security informatics
Submitted by aekwall on Thu, 04/08/2021 - 3:42pm
instruction sequence
security domain
vehicle dynamics
information theoretic security
activity trace
behavior prediction
dynamic information-theoretic measure
dynamical process analysis
innocent computer network activity
Informatics
legitimate software
malicious computer network activity
Predictive Analytics
security application
Security informatics
social network dynamics
stochastic dynamical system
Social network services
Cryptography
malware
invasive software
cyber security
Resiliency
Human behavior
pubcrawl
policy-based governance
Scalability
social networking (online)
Metrics
social network
natural language processing
information theory
Markov processes
static analysis
biblio
An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network
Submitted by aekwall on Thu, 04/08/2021 - 3:36pm
ransomware behavior
malware
microsoft windows
neural nets
Neural networks
newly found research paradigm
pubcrawl
Ransomware
ransomware attacks
low-level file system
ransomware detection
ransomware families
ransomware researchers
ransomware samples
ransomware samples every day
Resiliency
retail to critical infrastructure
global surge
artificial neural network
Compositionality
Cryptography
cyber-attacks
Data collection
discovering novel ransomware families
driven effective ransomware detection scheme
effective artificial neural network structure
i-o systems security
I/O Monitoring
industry-based security researchers
Information Reuse and Security
invasive software
IRP logs
Kernel
learning (artificial intelligence)
biblio
DeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection
Submitted by grigby1 on Tue, 03/30/2021 - 11:04am
three-sigma limit rule
Organizations
pubcrawl
ransomware activity
ransomware criminals
ransomware detection
ransomware incidence report
security
system monitoring
neural nets
tools
Training
Training data
user activity
User behavior Analytics
user behavior modeling
WannaCry
Ransomware
learning (artificial intelligence)
invasive software
Informatics
Human Factors
Human behavior
file-interaction pattern logging
DeepGuard
deep generative user-behavior analytics
deep generative autoencoder architecture
Deep Autoencoders
Data mining
Cybersecurity
Attack detection
Compositionality
Resiliency
biblio
A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data
Submitted by aekwall on Mon, 03/29/2021 - 10:59am
Generative Adversarial Network(GAN)
generative adversarial network
LSTM
Predictive Metrics
machine learning approaches
antivirus companies
common threats
convolutional neural network (CNN)
cyber-security dangers
deep learning-based malware hunting technique
deep learning
Imbalanced
imbalanced training data sets
long short term memory
Long Short Term Memory(LSTM)
multiple class classification problems
Opcode
opcode sequences
oversampling minority classes
Generative Adversarial Learning
pattern classification
malware
invasive software
Data models
machine learning algorithms
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
Computational modeling
Scalability
internet
Training
CNN
convolutional neural nets
convolutional neural network
generative adversarial networks
recurrent neural nets
malware samples
biblio
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory
Submitted by aekwall on Mon, 03/29/2021 - 10:51am
Repeated game
zero-sum
third-party companies
prospect theory
optimal deception rationality
offshore manufacturing
multilevel game-theoretic framework
manufactured ICs
malicious IC manufacturer
learning stage
IC designers
Hardware Trojans
hardware Trojan detection
first-step deception mitigation process
deception analysis
actual game stage
Scalability
hypergame theory
integrated circuits
game theoretic security
Predictive Metrics
Human Factors
Cybersecurity
supply chains
Supply Chain
pubcrawl
Resiliency
learning (artificial intelligence)
deception
invasive software
game theory
biblio
Attacking Key Management in Ransomware
Submitted by grigby1 on Wed, 03/17/2021 - 11:43am
pubcrawl
targeted attacks
steady growth
Scalability
Resiliency
resilience
real-world ransomware
ransomware kill chain
Ransomware
public sector entities
public key cryptography
Public key
attacking key management
private sector entities
opportunistic attackers
NIST
memory attacks
invasive software
extracted keys
encryption
dynamically extracting decryption keys
concerning trends
Computer crime
Chained Attacks
biblio
IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware
Submitted by grigby1 on Mon, 03/15/2021 - 12:11pm
IoTC-MAL
vulnerabilities
virtualisation
virtual environment
video surveillance
Servers
Resiliency
resilience
pubcrawl
network-connected devices
Metrics
malware
malicious samples
low-interactive IoT honeypots
IoTCMal
authentication
IoT device
IoT
invasive software
Internet of Things
hybrid IoT honeypot
honeypot
homology analysis
Computer hacking
composability
command injection attacks
Bridges
authorisation
authentication services
biblio
A Conceptual Direction on Automatically Evolving Computer Malware using Genetic and Evolutionary Algorithms
Submitted by grigby1 on Tue, 03/09/2021 - 2:06pm
genetic algorithms
security
Scalability
Resiliency
resilience
pubcrawl
Proactive Defence
Metrics
malware creation
malware
Mal-ware Analysis
invasive software
internet
Human behavior
artificial ecosystem
evolutionary computing
evolutionary computation
Evolutionary algorithms
cyber world
cyber security
computing devices
computer malware
co-evolutionary predator-prey framework
BIOS
biologically inspired computing
Bio-inspired computing
artificial world
biblio
Towards Data-Driven Characterization of Brute-Force Attackers
Submitted by grigby1 on Tue, 03/09/2021 - 1:37pm
IP networks
unrelated IP addresses
timing information
timing
threat hunters
targeted attack campaigns
public Internet
pubcrawl
Protocols
policy-based governance
password
Organizations
meta data
malicious login attempts
low-threat attacks
attacker dictionary
invasive software
internet
Human Factors
Human behavior
dictionary-based brute-force attack
defensive measures
data-driven characterization
coordinated attacks
connection metadata
computer network security
clustering
brute-force login attempts
brute-force attackers
brute force attacks
biblio
A Two-stage P2P Botnet Detection Method Based on Statistical Features
Submitted by grigby1 on Tue, 03/09/2021 - 1:25pm
Payloads
unsolicited e-mail
two-stage P2P botnet detection method
traffic statistical features
telecommunication traffic
statistical feature
statistical analysis
software engineering
Resiliency
resilience
real-time systems
pubcrawl
Peer-to-peer computing
benign P2P hosts
p2p
network security
Monitoring
Metrics
machine learning
invasive software
feature extraction
detection
computer network security
composability
botnets
botnet
1
2
3
4
5
6
7
8
9
…
next ›
last »