Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
invasive software
biblio
Behavioral Malware Detection in Delay Tolerant Networks
Submitted by BrandonB on Wed, 05/06/2015 - 10:33am
DTN model
Silicon
short-range communication technologies
proximity malware
polymorphic malware
obfuscated malware
naive Bayesian model
modern mobile consumer electronics
mobile radio
Mathematical model
malware
invasive software
filtering theory
Equations
adaptive look ahead
dogmatic filtering
delay-tolerant-network model
Delay-tolerant networks
delay tolerant networks
Bluetooth
behavioral malware characterization
behavioral characterization
Bayesian methods
Bayesian malware detection
Bayesian filtering
Bayes methods
aging
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 10:32am
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
Understanding botclouds from a system perspective: A principal component analysis
Submitted by BrandonB on Wed, 05/06/2015 - 10:26am
invasive software
UDP-storm
transport protocols
TCP-flood
Storms
state-of-the-art botnets detection
principal component analysis
Measurement
IT industry
attack-as-a-service delivery model
DDoS Attacks
Correlation
Context
computer network security
Computer crime
Cloud Computing
botclouds
biblio
Design, deployment and use of HTTP-based botnet (HBB) testbed
Submitted by BrandonB on Wed, 05/06/2015 - 10:23am
HTTP flooding
Web servers
Web access log
real time HTTP-based botnet
malware
invasive software
Intrusion Detection
Internet-connected computer programs
HTTP-GET flooding method
HTTP-based botnet
behavioural-based approaches
http bot traces
HBB testbed
Floods
distributed denial of service attacks
DDoS Attacks
Cyber Attacks
Computer crime
botnet detection systems
botnet
biblio
An efficient flow-based botnet detection using supervised machine learning
Submitted by BrandonB on Wed, 05/06/2015 - 10:20am
malicious botnet network traffic identification
Vegetation
Training
Traffic classification
Traffic analysis
telecommunication traffic
Support vector machines
supervised machine learning
Protocols
Peer-to-peer computing
packet flow
P2P botnets
nonmalicious applications
Accuracy
machine learning
learning (artificial intelligence)
invasive software
flow-based traffic analysis
flow-based botnet detection
feature extraction
computer network security
botnet neutralization
Botnet detection
botnet
Bayes methods
biblio
Spam Trapping System: Novel security framework to fight against spam botnets
Submitted by BrandonB on Wed, 05/06/2015 - 10:18am
prevent-then-detect approach
warfare kill zone
Unsolicited electronic mail
unsolicited e-mail
STS
static an analysis
spam trapping system
spam botnets
spam botnet detection
security framework
sandboxing principle
program diagnostics
airport check-in system
malware bot
malware
invasive software
intrusion detection system
dynamic analysis
defense-in-depth model
Cryptography
computational cost
Charge carrier processes
Airports
biblio
Statistical Assessment of Sybil-Placement Strategies within DHT-Structured Peer-to-Peer Botnets
Submitted by BrandonB on Wed, 05/06/2015 - 10:11am
internet
Topology
Sybil placement strategy statistical assessment
Stochastic processes
Stochastic Process
statistical analysis
Routing
peer-to-peer distributed hash tables
Peer-to-peer computing
packet level network simulation
network topology
invasive software
botnet command and control solution
interdefender coordination
diffused random graph
DHT-structured peer-to-peer botnets
DHT-structured P2P botnets
cyber security threat
Computers
computer network security
Computational modeling
compromised computer on-demand collections
command and control systems
C&C solutions
biblio
How can botnets cause storms? Understanding the evolution and impact of mobile botnets
Submitted by BrandonB on Wed, 05/06/2015 - 10:10am
malware
wireless links
service requests
quadratic growth
Peer-to-peer computing
node mobility
network bandwidth
mobility range
mobile services
mobile nodes
mobile networks
mobile malware
mobile computing
mobile botnets
botnet propagation storms
last chipper time
invasive software
Internet botnets
internet
exponential growth
epidemic modeling
distributed mechanism
denial-of-service impact
data forwarding
coordinated attacks
computer network security
compromised nodes
biblio
Malicious data classification using structural information and behavioral specifications in executables
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
Software
malwares
NtTrace
obfuscation technology
pattern classification
program diagnostics
security devices
signature database
signature-based detection system
malware detection system efficiency improvement
static analysis
structural information
Syntactics
system calls
threat detection
threat mitigation
underground Internet economy
zero-day malware detection
internet
antivirus
automated malicious programs
behavioral specifications
Classification algorithms
dynamic analysis
executable file
feature extraction
Information systems
Algorithm design and analysis
invasive software
malicious behavior extraction
malicious data classification
malicious software detection
malicious software mitigation
malware
malware detection
malware detection system effectiveness improvement
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
« first
‹ previous
…
30
31
32
33
34
35
36
37
38
next ›
last »