Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
invasive software
biblio
DeepMal: A CNN-LSTM Model for Malware Detection Based on Dynamic Semantic Behaviours
Submitted by aekwall on Mon, 02/08/2021 - 1:41pm
cyber-criminals
recurrent neural nets
Human Factors
LSTM
Compositionality
high-level abstractions
CNN-LSTM model
Cyber Dependencies
component-CNN
convolution
deep learning framework
DeepMal
dynamic semantic behaviours
evil intentions
locally spatial correlations
malicious programs
malware classification task
sequential longterm dependency
Metrics
malware
malware detection
invasive software
Data models
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
Scalability
Neurons
pattern classification
Training
machine learning
convolutional neural nets
natural language processing
NLP techniques
biblio
MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification
Submitted by grigby1 on Wed, 02/03/2021 - 2:01pm
resilience
malware campaigns
memory size 4.0 TByte
MikroTik
MikroTik devices
MikroTik devices landscape
MikroTik routers
pubcrawl
realistic honeypots
low-cost routers
Resiliency
RouterOS
Scalability
security
telecommunication network routing
time 45.0 d
vulnerabilities
Honey Pot
Computer crime
computer network security
core network infrastructure
core networks
core routers
DDoS Attacks
easy-to-deploy MikroTik honeypot
hacker attacks
automated attack classification
honey pots
honey-pot
Human behavior
Human Factors
internet
Internet exchanges
invasive software
biblio
An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks
Submitted by grigby1 on Wed, 02/03/2021 - 2:01pm
Intrusion Detection
wrapping attacks
Virtual machining
specific honey pot algorithm
Servers
security issues
security
Scalability
Resiliency
resilience
pubcrawl
procedural intrusion way
malware
invasive software
Intrusion Detection Systems
Browser Security
intrusion
Human Factors
Human behavior
honey pots
honey pot attack
Honey pot (computing)
Honey Pot
Flooding Attacks
common security breaches
cloud computing security attacks
Cloud Computing
browser malware-injection attacks
authentication
attacks
biblio
MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding
Submitted by grigby1 on Mon, 01/25/2021 - 11:29am
Resiliency
invasive software
magnetic cover channel
Magnetic separation
Magnetometers
Metrics
prototype MagView
pubcrawl
resilience
information embedding
secret data
sensitive information
transmitter computer
video coding
video decoding
video encoding
video frame type
video quality degradation
CPU utilization
Air gaps
air-gap
air-gapped internal network
air-gapped networks
Central Processing Unit
composability
Computers
cover channels
covert channels
Decoding
distributed magnetic covert channel
encoding
error statistics
Human behavior
Human Factors
Image coding
biblio
CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives
Submitted by grigby1 on Mon, 01/25/2021 - 11:27am
novel acoustic covert channel
Drives
exfiltration
Human behavior
Human Factors
internet
invasive software
loudspeakers
malware
Metrics
nearby Internet connected receiver
digital versatile discs
optical drives
optical modulation
optical receivers
process sensitive information
pubcrawl
resilience
Resiliency
signal generation
smart phones
composability
acoustic signal detection
acoustical characteristics
Acoustics
air gap
Air gaps
air-gapped environment
air-gapped networks
audioless air-gapped computers
CD-LEAK
acoustic
compromised computer
computer network security
computer speakers
Computers
covert acoustic signals
covert channels
data modulation
Demodulation
demodulation algorithms
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 2:38pm
DeCrypto Pro
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
Long short-term memory
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
cyberattacks
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
Cryptography
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
biblio
Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis
Submitted by aekwall on Mon, 01/18/2021 - 11:25am
optimisation
Fuzzy Cryptography
YARA rule conditions
rule optimisation process
Performance Optimisation
YARA rules
Fuzzy Hashing
fuzzy rules
Fuzzy sets
fuzzy set theory
Fuzzy logic
Malware Analysis
Scalability
pattern matching
optimization
standards
Metrics
Cryptography
Ransomware
pubcrawl
Resiliency
invasive software
malware
biblio
Fuzzy-Import Hashing: A Malware Analysis Approach
Submitted by aekwall on Mon, 01/18/2021 - 11:25am
Import Hashing
Task Analysis
Scalability
Resiliency
Ransomware
pubcrawl
Metrics
Malware Analysis
invasive software
Attack Surfaces
fuzzy-import hashing
fuzzy set theory
Fuzzy Hashing
Fuzzy Cryptography
fuzzy c-means clustering
Electronic mail
Cryptography
counterfeit malware samples
biblio
Design of Intrusion Prevention System for OT Networks Using Deep Neural Networks
Submitted by aekwall on Mon, 01/11/2021 - 1:36pm
OT Network
intrusion prevention system
invasive software
IPS system
malware
Modbus
network threats
neural nets
Neural networks
operational technology system elements
internet
OT networks
Protocols
pubcrawl
Resiliency
SCADA
SCADA systems
SCADA test bed
Scalability
telecommunication security
deep neural networks
Air gaps
automation industries
automation scenarios
behavior-based intrusion prevention system
computer network security
cyber-attacks
data acquisition
data acquisition systems
Deep Neural Network
SCADA Systems Security
deep packet inspection
DNP3
DoS attack
feature extraction
industrial control
Industries
industry control system
insider attacks
integrated circuits
biblio
A Malware Detection Method Based on Improved Fireworks Algorithm and Support Vector Machine
Submitted by aekwall on Mon, 12/14/2020 - 12:31pm
Levy Flights
SVM
Support vector machines
support vector machine
signature-based anti-virus systems
Resiliency
pubcrawl
Predictive Metrics
penalty factor
pattern classification
particle swarm optimization
particle swarm optimisation
optimal parameter combination
Malware detection method
malware detection
machine learning methods
threat vectors
learning (artificial intelligence)
kernel function parameter
invasive software
improved fireworks algorithm
genetic algorithms
Fireworks algorithm
Evolutionary algorithms
differential evolution
Decision trees
computer systems
composability
classification performance
privacy
Measurement
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »