Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
invasive software
biblio
Early Detection of In-the-Wild Botnet Attacks by Exploiting Network Communication Uniformity: An Empirical Study
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Resiliency
multiple infected machines
network behaviour
network communication uniformity
outgoing bot attacks
port scanning attacks
pubcrawl
real-world spamming
resilience
Monitoring
Servers
synchronised behaviour
Synchronization
trojan horse detection
Trojan horses
unsolicited e-mail
widespread infection
botnet communication
malicious behaviour
large-scale malware propagation campaigns
invasive software
in-the-wild botnet attacks
early infection
early detection
distributed attack
cyber physical systems
computer network security
Computer crime
composability
command botnets
botnet-infected machines
botnet traffic
botnet controllers
biblio
Intra-Die-Variation-Aware Side Channel Analysis for Hardware Trojan Detection
Submitted by grigby1 on Wed, 04/11/2018 - 2:59pm
Sensitivity
logic testing
Power based Side-channel
Power measurement
probability
process variation levels
Process Variations
pubcrawl
relative power difference
resilience
Resiliency
logic circuits
sequential type Trojans
side channel analysis
spatial correlation
Systematics
test pattern generation
Trojan activation probability
trojan horse detection
Trojan horses
Trojan inserted circuits
hardware trojan
automatic test pattern generation
combinational type Trojans
composability
cyber physical systems
delays
Detection sensitivity
efficient Trojan detection approach
elevated process variations
Hardware
AES-128 circuit
hardware Trojan detection
high detection sensitivity
integrated circuit design
integrated circuit testing
integrated circuits
intra-die-variation
invasive software
ISCAS 89 benchmark
ITC 99 benchmark
biblio
A General Framework of Hardware Trojan Detection: Two-Level Temperature Difference Based Thermal Map Analysis
Submitted by grigby1 on Wed, 04/11/2018 - 2:59pm
Temperature measurement
Mathematical model
normal circuits
operating chip
power proportion magnitude
pubcrawl
resilience
Resiliency
serious threats
Kalman filters
Thermal analysis
Thermal map analysis
thermal map analysis detection method
trojan horse detection
Trojan horses
two-level temperature difference
White noise
commercial chips
Kalman filter algorithm
Kalman filter
invasive software
Integrated circuit modeling
integrated circuit design
infrared imaging
hardware Trojan detection
Hardware
general framework
field programmable gate arrays
equivalent circuits
differential thermal maps
differential temperature
cyber physical systems
composability
biblio
MalFire: Malware firewall for malicious content detection and protection
Submitted by K_Hooper on Wed, 04/04/2018 - 10:00am
malicious content protection
Web servers
vulnerability detection
user data security
user data privacy
tools
sensitive information
security
Resiliency
pubcrawl
privacy
online portion
Metrics
malware injection
malware firewall
malware
ad blocking tool
malicious content detection
MalFire
IP networks
invasive software
internet
Human behavior
firewalls
data privacy
Content Injection
contemporary threats
Compositionality
Companies
adware injection
adware content
Adware
biblio
Malware Detection for Secure Microgrids: CoSSMic Case Study
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
Microgrids
vulnerability detection
SmartGrid
smart-devices
security vulnerability
security threats
security
sandbox
Resiliency
pubcrawl
Protocols
power system security
power engineering computing
performance evaluation
Monitoring
Compositionality
microgrid ecosystem
microgrid
Metrics
malware detection
malware
invasive software
Human behavior
energy infrastructure
electric microgrids
distributed power generation
Cybersecurity
cyber vulnerabilities
CoSSMic project
biblio
In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
integrated modelling language
UNIX operating systems
UNIX operating system
Unix
self-replicating malware
Resiliency
resilience
pwnPr3d modelling approach
pubcrawl
operating systems
Metrics
invasive software
Analytical models
ICT systems
hardware components
Hardware
cybersecurity analysis
computer security
computer architecture
composability
attack graphs
architectural cyber security analysis
Architectural Analysis
biblio
Optimizing Detection of Malware Attacks through Graph-Based Approach
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Metrics
hook attacks
Host-based
invasive software
Kernel
malicious code execution
malicious system call
malware
malware attacks
Graph-model
Monitoring
optimisation
optimization
pubcrawl
resilience
Resiliency
signature-based model
tools
computer viruses
API hook
application program interfaces
application programming interface
attack graphs
code obfuscation technique
communication technology
composability
Computational modeling
API graph-based model
Computers
digital signatures
graph comparison
graph partition
graph theory
graph-based approach
graph-generation
biblio
Autoencoder-Based Feature Learning for Cyber Security Applications
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
invasive software
Vectors
Training
Resiliency
resilience
pubcrawl
policy-based governance
pattern classification
Metrics
malware classication
malware
machine learning
learning (artificial intelligence)
AE
Intrusion Detection
feature vector
feature learning
feature extraction
encoding
cyber security
computer security
computer network security
autoencoder
Artificial Neural Networks
anomaly intrusion detection
biblio
Dynamic Malware Detection Using API Similarity
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
malware
user-confidential information
Trojans
Trojan horses
trojan
tools
Sea measurements
Resiliency
resilience
pubcrawl
pattern matching
malware-detection method
malware samples
Malware Analysis
API
invasive software
information security
Hacker
feature extraction
dynamic Malware detection method
Data mining
credit card details
credit card
Computer crime
Compositionality
application program interfaces
APIs
API similarity
biblio
A New Mobile Botnet Classification Based on Permission and API Calls
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
pubcrawl
malware
mobile botnet attacks
mobile botnet classification
mobile botnet detection
Mobile communication
mobile computing
pattern classification
program diagnostics
malicious mobile applications
random forest algorithm
random processes
resilience
Resiliency
smart phones
smartphone
static analysis
Android (operating system)
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Humanoid robots
Feature Selection
feature extraction
Drebin dataset
Compositionality
application programming interface
application program interfaces
APIs
API calls
Androids
Android botnet
« first
‹ previous
…
25
26
27
28
29
30
31
32
33
…
next ›
last »