Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
invasive software
biblio
Comprehensive Behavior Profiling Model for Malware Classification
Submitted by grigby1 on Mon, 06/10/2019 - 2:02pm
Metrics
telecommunication traffic
specific traffic selection
security
Resiliency
resilience
pubcrawl
Protocols
privacy
Payloads
pattern classification
partial network behavior
network security
Network behavior profiling
network behavior based classification methods
appropriate countermeasures
malware variants
malware network activities
malware classification method
malware classification
malware
invasive software
Human behavior
feature extraction
Computers
computer network security
Computational modeling
comprehensive behavior profiling model
complex activities
behavior profiling models
biblio
Classifying Malware Using Convolutional Gated Neural Network
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
malware classification
Task Analysis
Resiliency
resilience
Recurrent neural networks
recurrent neural nets
pubcrawl
privacy
pattern classification
neural network
microsoft malware classification challenge
Metrics
malware detection
CNN
malware
malicious software
machine learning
Logic gates
invasive software
information technology society
Human behavior
Gated Recurrent Unit
feedforward neural nets
Deep Neural Network
convolutional neural networks
convolutional gated recurrent neural network model
biblio
Malware Classification with Deep Convolutional Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
learning (artificial intelligence)
Support vector machines
Resiliency
resilience
pubcrawl
privacy
Microsoft malware
Metrics
malware classification
malware binaries
malware
Malimg malware
machine learning approaches
machine learning
Learning systems
challenging malware classification datasets
invasive software
image classification
Human behavior
grayscale images
Gray-scale
feedforward neural nets
deep learning framework
deep learning approach
deep learning
deep convolutional neural networks
convolutional neural networks
convolution
computer architecture
CNN
biblio
Malware Classification Using Deep Convolutional Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
privacy
learning models
machine learning
malware
malware binaries
malware classification
malware images
Metrics
neural network
object detection
Pattern recognition
learning (artificial intelligence)
pubcrawl
resilience
Resiliency
support vector machine
support vector machine classifier training
Support vector machines
transfer learning
visual patterns
visualization
feature extraction
classification
classifier
convolutional neural nets
convolutional neural network
convolutional neural networks
Correlation
DCNN classification
deep convolutional neural networks
deep learning techniques
accuracy levels
Gray-scale
Hamming distance
Human behavior
image classification
image features
image representation
image type
improved image representation
invasive software
biblio
Behavioral Malware Classification Using Convolutional Recurrent Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
Metrics
Training
static signature
Resiliency
resilience
Recurrent neural networks
recurrent neural nets
Radio frequency
pubcrawl
privacy
Prefetching
pattern classification
Microsoft Windows Prefetch files
microsoft windows
anti-virus systems
malware classification
malware
invasive software
Human behavior
feature extraction
convolutional recurrent neural networks
convolutional neural nets
computer viruses
behavioral malware detection
behavioral malware classifiers
behavioral malware classification
anti-virus vendor naming schemes
biblio
Andro-Simnet: Android Malware Family Classification Using Social Network Analysis
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
pubcrawl
malware similarity
malwares attack behavior pattern
metamorphic malware
Metrics
mobile computing
mobile devices
pattern classification
polymorphic malware
privacy
malware family network aggregation
resilience
Resiliency
signature-based malware detection method
social network analysis
Social network services
social networking (online)
static analysis
tactical characteristics
graph visualization
Android (operating system)
Android malware family classification
behavior-based detection
Classification algorithms
detection algorithms
efficient malware classification
feature extraction
Generators
Andro-Simnet
high classification accuracy
Human behavior
invasive software
k-fold cross-validation
machine learning
malware
malware classification
malware dataset
biblio
Graph-Based APT Detection
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
Image edge detection
Web interface
undocumented attacks
Servers
Resiliency
pubcrawl
Protocols
privacy
Organizations
Metrics
Malware Analysis
invasive software
advanced persistent threats
Human behavior
HTTP traffic
graph-based APT detection
graph theory
graph model
detection system
Browsers
Batch production systems
Approximation algorithms
antiviruses
biblio
AppDNA: App Behavior Profiling via Graph-Based Deep Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
malicious apps
Task Analysis
Resiliency
pubcrawl
privacy
Plagiarism
pattern classification
Neural networks
mobile computing
mobile applications behaviors
Metrics
malware detection
malware classification
Malware Analysis
malware
app behavior profiling
machine learning
learning (artificial intelligence)
invasive software
Human behavior
graph-encoding method
graph-based deep learning
graph theory
function-call-graph-based app profiling
feature extraction
encoding
benign apps
AppDNA
app recommendation
biblio
DLGraph: Malware Detection Using Deep Learning and Graph Embedding
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
Metrics
Windows application programming interface calls
Windows API calls
Trojan horses
static analysis
stacked denoising autoencoders
softmax regression
SDA
Resiliency
representation learning
pubcrawl
privacy
pattern classification
noise reduction
neural nets
microsoft windows
application program interfaces
malware detection
Malware Analysis
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding
function-call graphs
function-call graph
feature extraction
embedded vector
embedded systems
DLGraph
deep learning
combined feature vector classification
biblio
A method to detect Internet of Things botnets
Submitted by aekwall on Mon, 05/20/2019 - 10:00am
IoT Security 2018
widespread botnets
unauthorized access
security of data
security
Resiliency
pubcrawl
Protocols
performance evaluation
Metrics
malware
main security problems
Logistics
logistic regression
authorisation
IoT devices
IoT
invasive software
Internet of Things
Human behavior
Cybersecurity
computer network security
composability
common characteristics
botnets
Botnet detection
botnet
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »