Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
invasive software
biblio
Cloud-based Android botnet malware detection system
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
feature extraction
Vyatta
smart phones
Servers
runtime Android malware analysis
pubcrawl170109
open source development framework
multilayered algorithm
malware
Java
invasive software
Humanoid robots
Android (operating system)
digital crime groups
Cloud-based malware detection
cloud-based Android botnet malware detection system
Cloud Computing
Classification algorithms
botnet detection learning dataset
Androids
Android Sandbox
Android on VirtualBox
Android botnet family detection
Android botnet
biblio
A review on recent phishing attacks in Internet
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
phishing attacks
Web sites
URL
unsolicited e-mail
Uniform resource locators
textual analysis
text analysis
Tabnapping
socially engineered messages
security
pubcrawl170109
phishing Website
phishing emails
Browsers
malware code
malware
invasive software
internet
illegal activity
email messages
email classification
Electronic mail
cyber-crime
Computer crime
Companies
biblio
A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO}/IEC 27037:2012
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
DTF methodologies
Window malware forensic toolkit
pubcrawl170109
operating systems (computers)
malware forensics
malware
ISO/IEC 27037:2012
ISO/IEC 27037
ISO standards
invasive software
internet
IEC standards
Hacker
Computer crime
digital triage forensics framework
digital triage forensics
Digital Forensics
digital forensic
digital evidence handling
data leakage
Cybercrime
cyber security incident
critical analysis
crime scene investigation
Computers
biblio
"A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis"
Submitted by abfox on Tue, 02/14/2017 - 2:18pm
malware
zero-day exploit
wavelet transforms
wavelet transform
wavelet package analysis
wavelet analysis
static detection method
pubcrawl170101
Portable document format
persistent threat attacks
Compounds
malicious program
malicious document detection system
malicious document detection
malicious code
invasive software
infected compound document
feature extraction
entropy analysis componen
document handling
biblio
"WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaigns"
Submitted by abfox on Tue, 02/14/2017 - 1:37pm
Markov Models
WAP
Topology
system survivability
Survivability
Steady-state
soft impacts
security community
security
scanning nodes
rejuvenation
quarantine
pubcrawl170101
probability
network topology
Mathematical model
advanced persistent threat
malware infections
malware
invasive software
infection probability
four-node topology
false positives
false negatives
early malware detection
critical infrastructures
critical infrastructure sectors
Critical Infrastructure Protection
coordinated massive malware campaign assessment
contagion probability
Analytical models
advanced persistent threats
biblio
"Execution Time Measurement of Virtual Machine Volatile Artifacts Analyzers"
Submitted by abfox on Tue, 02/14/2017 - 1:33pm
public domain software
virtualization environment
virtualisation
Virtual machining
virtual machines
virtual machine volatile artifact analyzers
Virtual machine monitors
virtual machine introspection
virtual infrastructure privileged access
storage management
spyware
Semantics
semantic gap
rootkit
Random access memory
advanced persistent threat
pubcrawl170101
memory forensic analysis tool
memory forensic analysis
malware
live virtual machine RAM dump
LibVMI open source tool
Kernel
invasive software
intrusion detection system
hypervisor
execution time measurement
Digital Forensics
captured memory dump analysis
advanced persistent threats
biblio
"Scalable command and control detection in log data through UF-ICF analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:13pm
fixed user agent string
UF-ICF analysis
scalable command-and-control detection
pubcrawl170101
pattern clustering
normal user
networking logs
malware
log data
IP networks
IP addresses
invasive software
intrusion prevention systems
information security
information filtering
Frequency modulation
advanced persistent threat
filtering methods
domain names
Decision support systems
coverage rate
connection behaviors
computer network security
command and control systems
Command and Control (C&C)
clustering methods
C&C sites
C&C server detection
botnet
benign service
APT
antivirus software
biblio
"Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation"
Submitted by abfox on Tue, 02/14/2017 - 12:44pm
malware
virtual networks
pubcrawl170101
Protocols
Ports (Computers)
penetration and exploration phase
path control
OpenFlow technology
OpenFlow
network security
mission execution phase
malware responding system
malware detection system
malware communication
advanced persistent threat attacks
IP networks
invasive software
intrusion detection system
initial compromise phase
entry control measures
Dynamic Responding
Digital Forensics
Databases
computer security
computer network security
attacking infrastructure building phase
APT attacks
biblio
"Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data"
Submitted by abfox on Tue, 02/14/2017 - 12:41pm
internet
Web proxy logs
system-on-chip
Servers
security products
pubcrawl170101
malware strains
malware
Los Alamos National Lab
large-scale log data mining
LANL
IP networks
invasive software
advanced persistent threat
graph theory
Electronic mail
early-stage enterprise infection detection
early-stage APT infection
DNS logs
Data mining
data analysis
business data processing
belief propagation
belief networks
APT infection attacks
advanced persistent threats
biblio
"Discarded hard disks ??? A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk"
Submitted by abfox on Tue, 02/14/2017 - 12:25pm
security threats
malware
Media
Organizations
pubcrawl170101
reconnaissance activities
recovered sensitive data
Security and Privacy Awareness
security controls
malicious link
sensitive-personal organizational data
social network analysis
Software
Spear-phishing
stolen storage devices
Trust management
unsolicited e-mail
e-mail credibility
background information
Cybercrime
cybercriminals
Data protection
data recovery
Digital Forensics
discarded hard disks
discarded storage devices
advanced persistent threat
Electronic mail
hard discs
Hard disks
invasive software
malicious activities
malicious actors
malicious attachment
« first
‹ previous
…
30
31
32
33
34
35
36
37
38
next ›
last »