Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
invasive software
biblio
Oases: An Online Scalable Spam Detection System for Social Networks
Submitted by aekwall on Mon, 02/25/2019 - 11:42am
social communities
DHT based overlay
Distributed databases
load-balancing
malware disseminators
Oases
online scalable spam detection system
progressive aggregation tree
resource allocation
decentralized DHT-based tree overlay deployment
social spam
spam classifiers
spammers
trees (mathematics)
Twitter data
Vegetation
Web-based social networks
Metrics
invasive software
Human behavior
pubcrawl
Routing
Peer-to-peer computing
online social networks
social networking (online)
Twitter
Scalability
pattern classification
internet
unsolicited e-mail
spam detection
Training
community-based opportunities
content polluters
biblio
A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
privacy
website connected database
Web sites
vulnerabilities
tools
threats
SQL injection attack
SQL injection
SQL
specific website
Servers
retrieving sensitive information
Resiliency
real-world implementation
query processing
pubcrawl
actual website
preventive measures
policy-based-governance
open source tools
Metrics
Linux
invasive software
Human behavior
foundational cybersecurity course
executing SQL queries
enhanced cybersecurity learning
Databases
Crawlers
computer science education
Computer hacking
Acunetix
biblio
The Android Malware Static Analysis: Techniques, Limitations, and Open Challenges
Submitted by grigby1 on Fri, 02/22/2019 - 4:11pm
malware
static code analysis
static analysis frameworks
static analysis
Semantics
semantic features
Resiliency
pubcrawl
program diagnostics
obfuscation techniques
obfuscation
meta data
manifest-based features
malware detection
android
malicious applications
invasive software
Human behavior
Hardware
feature extraction
Cryptography
composability
commercial antiviruses
code-based features
application metadata-based features
android malware static analysis
Android (operating system)
biblio
Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications
Submitted by grigby1 on Thu, 02/14/2019 - 11:20am
leaked information
US
transport protocols
taint analysis
suspicious URL
static taint analysis
smart phones
SG
Servers
security of data
pubcrawl
Metrics
malware
malicious applications leak multiple types
malicious Android applications
Android (operating system)
IP networks
invasive software
information exfiltration
identity-related sensitive information
hypermedia
Humanoid robots
HTTP-based information exfiltration
HTTP Based
Global Positioning System
composability
CN
clouds
Androids
Android applications
biblio
Leveraging Historical Versions of Android Apps for Efficient and Precise Taint Analysis
Submitted by grigby1 on Thu, 02/14/2019 - 11:19am
invasive software
user apps
tools
taint checking
taint analysis
simultaneous scalability
security vulnerabilities
security
representative precise taint analysis
real-world evolving Android apps
reachability analysis
pubcrawl
Open Source Software
mobile computing
Metrics
analysis effectiveness
incremental taint analysis
incremental
historical versions
Google
EVOTAINT
Evolution
differencing
composability
Benchmark testing
attacks
Android ecosystem
Android devices
Android (operating system)
android
biblio
ERASMUS: Efficient remote attestation via self-measurement for unattended settings
Submitted by aekwall on Wed, 02/13/2019 - 11:59am
Phase measurement
composability
pubcrawl
Human behavior
Resiliency
untrusted remote device
unattended devices
Time measurement
software state
safety-critical applications
real-time systems
real-time devices
Radio frequency
RA techniques
Quality-of-Attestation
potentially expensive computation
Internet of Things
on-demand operation
mobile malware
mobile computing
invasive software
ERASMUS
embedded devices
efficient remote attestation
concrete technique
software integrity
security
Remote Attestation
malware
attestation
IoT devices
biblio
Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol
Submitted by grigby1 on Thu, 01/31/2019 - 12:13pm
safest places
mobile device
mobile malware
network communications
Petri nets
privately owned smart device
Protocols
pubcrawl
radiofrequency identification
resilience
Resiliency
Metrics
secure places
Servers
smart phones
unintentional piggybacking
Universal Serial Bus
USB attack surface
USB connection streams
USB security
USB storage
Filtering
air-gapped networks
authentication
coloured Petri nets
Coloured Petri Nets (CPN) modelling
composability
Computational modeling
corporate network
Cryptographic Protocols
delegation protocol
epidemic model.
Air gaps
free malware equilibrium
Human behavior
intentional piggybacking
Internet of Things (IoT)
invasive software
lightweight authentication
malware
malware infection
malware spread
biblio
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs
Submitted by grigby1 on Thu, 01/31/2019 - 12:13pm
Resiliency
malware
Metrics
Network
networking equipment
optical
Optical sensors
optical signals
Protocols
pubcrawl
remote cameras
resilience
malicious code
router LED
security cameras
sensitive information
smart phones
smartphone cameras
status LED
switch LED
telecommunication security
transmission protocol
xLED
Ezfiltration
air-gap
air-gapped network
bit rate 1.0 bit/s
bit rate 2000.0 bit/s
Cameras
composability
Computer crime
covert channel (key words)
covert data exfiltration
covert-channel
Air gaps
hermetic isolation
Human behavior
internet
invasive software
IT network
LAN routers
LAN switches
light emitting diodes
Local area networks
low-level control
biblio
A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
network-based intrusion systems
execution sequences
fileless malware
host based intrusion detection system
installed applications
lightweight host-based intrusion detection system
malicious activities
malicious e-mail attachments
management tools
network administrators
enterprise networks
OS vendors
PowerShell process
process generation patterns
process information
serious social problem
Spreadsheet programs
system constructs process trees
targeting organizations
XML
microsoft windows
tools
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
drive-by-download attacks
Intrusion Detection
security of data
Organizations
advanced persistent threat
advanced persistent threats
active processes
anomaly processes
anti-virus software
computer viruses
Electronic mail
biblio
Moving Target Defense Against Advanced Persistent Threats for Cybersecurity Enhancement
Submitted by grigby1 on Mon, 01/21/2019 - 12:36pm
intrusion prevention systems
cybersecurity attacks
cybersecurity enhancement
deception techniques
enterprise-level organizations
IKC models
IKC progression
IKC-based intrusion activities
Intrusion Kill Chain (IKC)
intrusion kill chain model
complex multi-step attack scenario
moving target defense
moving target defense (MTD)
MTD techniques
network assets
network-based services
Networked Infrastructure
Reconnaissance
security concerns
Intrusion Detection
Analytical models
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
Cybersecurity
computer network security
Intrusion Detection Systems
Organizations
IP networks
abstraction levels
Advanced Persistent Threat (APT)
advanced persistent threats
APT attack strategies
APT attacks
APTs
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
…
next ›
last »