Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
invasive software
biblio
A context-sensitive approach for precise detection of cross-site scripting vulnerabilities
Submitted by BrandonB on Tue, 05/05/2015 - 10:41am
precise detection
XSS vulnerability
XSS attacks
Web application
vulnerability detection
taint analysis
standards
source code (software)
source code
software development life cycle
Software
social communication
Servers
sensitive information
security
Browsers
malware
malicious user
malicious operation
invasive software
internet
hypermedia markup languages
HTML
health services
financial transaction
defensive programming based HTML context-sensitive approach
cross-site scripting vulnerability
cross-site scripting
Context
biblio
Inferring Malware Family through Application Protocol Sequences Signature
Submitted by BrandonB on Mon, 05/04/2015 - 2:42pm
application protocol sequences signature
computer network security
Cryptography
cyber-threats
Databases
Engines
Feeds
invasive software
learning (artificial intelligence)
machine learning algorithm
malicious packets detection
malware
malware automatic dynamic analysis
malware traffic detection
network traffic
Protocols
biblio
Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
Submitted by BrandonB on Mon, 05/04/2015 - 1:28pm
malware detection
transformation attacks
operating systems (computers)
obfuscation techniques
next-generation solutions
mobile malware threats
Mobile handsets
mobile devices
mobile computing
Mobile communication
mobile
malware transformation
android
malware authors
malware
invasive software
Humanoid robots
encryption
DroidChameleon
commercial mobile antimalware products
anti-malware
Androids
Android antimalware
biblio
Application H-Secure for mobile security
Submitted by BrandonB on Mon, 05/04/2015 - 1:16pm
mobile operating system
Graphical Password
graphical user interfaces
H-Secure application
invasive software
malicious code
malware
Mobile communication
mobile computing
Mobile handsets
free-download content
mobile operating systems
mobile security applications
open devices
personal data
private key cryptography
Servers
smart phones
unauthorized person
Web server
confidential file storage
Android (operating system)
Android smart phones
application stores
authentication
authorisation
business applications
business data
confidential business information
confidential data storage
AES Encryption and Decryption
data access
decryption process
destination servers
employee-owned device
encrypted file
encryption
encryption key
free-download apps
biblio
Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks
Submitted by BrandonB on Fri, 05/01/2015 - 7:59am
malware propagation model
WSN
wireless sensor networks
traditional epidemic theory
telecommunication security
telecommunication control
sleep mode
Silicon
sensor node characteristics
saddle-point
overall cost minimization
optimal dynamic strategy
optimal control problem
malware-defense differential game
malware propagation prevention
bang-bang control
Malware propagation
malware
invasive software
Grippers
Games
epidemic theory
Differential Games
differential game-based strategy
Differential game
differential equations
decision-making problem
control systems
bang-bang controls
biblio
Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks
Submitted by BrandonB on Thu, 04/30/2015 - 2:10pm
hackers
translation lookahead buffers monitoring
TLB
system monitoring
security
memory pages identification
legitimate code injection attack
invasive software
Handheld computers
blocks malicious injected code activation
external I/O operations
Decision support systems
data execution prevention
Computer crime
code injection attack detection
Code injection
Buffer storage
biblio
Design, implementation and security analysis of Hardware Trojan Threats in FPGA
Submitted by BrandonB on Thu, 04/30/2015 - 1:41pm
integrated circuits
RoT
security
denial of service
design
encryption
field programmable gate arrays
FPGA testbed
Hardware
hardware Trojan detection technique
hardware Trojan threats
Hardware Trojans
HDM
HTT detectability metric
HTT detection
ICs
timing variation
integrated logic circuits
invasive software
missed detection probability
normalized physical parameters
optimal detection threshold
power consumption
Power demand
Resiliency
root of trust
Security analysis
sensitive information leak
summation of false alarm
timing
Trojan taxonomy
Trojan horses
biblio
Understanding botclouds from a system perspective: A principal component analysis
Submitted by BrandonB on Thu, 04/30/2015 - 1:21pm
invasive software
UDP-storm
transport protocols
TCP-flood
Storms
state-of-the-art botnets detection
principal component analysis
Measurement
IT industry
attack-as-a-service delivery model
DDoS Attacks
Correlation
Context
computer network security
Computer crime
Cloud Computing
botclouds
biblio
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
malicious code
Training
security precaution
Safety
prudent science
prudent practice
malware experiment design
malware dataset
malware
Communities
invasive software
internet
Guidelines
experiments
dynamic analysis
detection model
datasets
« first
‹ previous
…
30
31
32
33
34
35
36
37
38