Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
invasive software
biblio
Evolved Similarity Techniques in Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:14pm
malware function similarity techniques
Zeus malware
Zeus
Semantics
reverse engineering
Resiliency
Registers
pubcrawl
privacy
Predictive Metrics
Metrics
Manuals
malware similarity
malware samples
Malware Analysis
malware function pairs
malware family
malware evolution
malware authors
malware
invasive software
Human behavior
function call graph
evolved similarity techniques
evolved code
Databases
binary similarity
graph theory
biblio
Using Deep-Learning-Based Memory Analysis for Malware Detection in Cloud
Submitted by aekwall on Mon, 10/26/2020 - 12:13pm
dynamic analysis approach
virtual machine
virtual machines
machine-learning-based approaches
file system
Virtual machine monitors
cloud nodes
deep learning technology
deep-learning-based memory analysis
Predictive Metrics
malicious binary files
malware execution
Memory Analysis
memory analysis approach
real-world malwares
run-time overhead
zero-day malware
Monitoring
Gray-scale
Malware Analysis
Virtual machining
privacy
Metrics
deep learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
invasive software
malware detection
malware
Cloud Computing
biblio
Evolutionary Computation for Improving Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:13pm
program debugging
variable-strength covering arrays
software improvement
malicious code
individual software artifacts
GI-based bug repair
GI-based approach
genetic improvement
automated repair
automated malware analysis
benign software
Genetics
evolutionary computation
malicious software
Predictive Metrics
Servers
malware samples
Malware Analysis
genetic algorithms
software maintenance
privacy
tools
Metrics
pubcrawl
Human behavior
Resiliency
invasive software
security
malware
biblio
A Novel Machine Learning Based Malware Detection and Classification Framework
Submitted by aekwall on Mon, 10/26/2020 - 12:13pm
complex malware types
Predictive Metrics
computer systems
Feature Selection
dynamic analysis
feature selection algorithms
machine learning models
classification accuracy
accurate malware detection
analysis report
classification framework
malware samples
fine-grained classification
high detection
malware analysis framework
malware files
minimum computation cost
selection module
signature-based malware detection techniques
system activities
time progresses
Training
invasive software
machine learning algorithms
feature extraction
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
pattern classification
malware
machine learning
testing
privacy
Virtual machining
Malware Analysis
cuckoo sandbox
malware classification
malware detection
static and dynamic analysis
biblio
IoT Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:12pm
machine learning
Ollydebug
IoT malware analysis
information system integrity
information system confidentiality
information system availability
CIA triad
malicious users
malicious software
Predictive Metrics
malware attacks
Malware Analysis
image recognition
privacy
IoT
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
invasive software
security
malware
data integrity
IoT devices
Internet of Things
Conferences
biblio
Insights into Malware Detection via Behavioral Frequency Analysis Using Machine Learning
Submitted by aekwall on Mon, 10/26/2020 - 12:11pm
known malware
malicious software
malicious activity
Microsoft Windows (operating systems)
machine learning models
behavioral frequency analysis
benign software
common defenses
common malware defenses
dynamic behavioral analysis
Predictive Metrics
Malware Behavioral Analysis
malware signature classifier
malware threat landscape
signature catalog
unknown malware
Windows API system function calls
zero-day
zero-day vulnerabilities
Metrics
malware detection
invasive software
machine learning algorithms
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
machine learning
malware
pattern classification
Analytical models
privacy
microsoft windows
Malware Analysis
application program interfaces
dynamic analysis
Software algorithms
biblio
IoT Malware Dynamic Analysis Profiling System and Family Behavior Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:11pm
family behavior analysis
Hidden Markov models
IoT malware
API call invocation
API hooking technique
automatic machine
Behavior Graph
conventional profiling methods
deployed IoT devices
virtual machines
family behavior graph
IoT malware dynamic analysis profiling system
IoT malware increases
profiling system adapts virtual machine introspection
QEMU
valuable IoT malware behavior
virtual machine introspection
Libraries
Big Data
Internet of Things
malware
invasive software
Resiliency
Human behavior
pubcrawl
Metrics
Inspection
privacy
Virtual machining
Malware Analysis
application program interfaces
dynamic analysis
Predictive Metrics
virtual machine
biblio
A study to Understand Malware Behavior through Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:11pm
Zero-day attacks
signature based detection
obfuscated malware
mutated malware
Malware Signature
Malware Packer
malware features
behavioral based malware signature
Histograms
Predictive Metrics
computer science
malware behavior
malware
Malware Analysis
static analysis
privacy
tools
Metrics
pubcrawl
Human behavior
Resiliency
feature extraction
invasive software
malware detection
biblio
Linux Security: A Survey
Submitted by aekwall on Mon, 10/26/2020 - 11:46am
password
Linux Operating System Security
Linux security
firewall security
file permissions
File
antivirus
firewall
Predictive Metrics
microsoft windows
authorisation
Business
Metrics
composability
pubcrawl
Resiliency
Linux
invasive software
security
malware
biblio
Assessing E-Security Behavior among Students in Higher Education
Submitted by aekwall on Mon, 10/12/2020 - 11:45am
behavior
Human Behavior and Cybersecurity
United Arab Emirates
Security Behavior Survey Instrument
password usage
online scam
higher educational institutions
higher education students
further education
e-security behavior assessment
E-security awareness
social engineering
Educational institutions
authorisation
data handling
Human Factors
Phishing
password
Cybersecurity
internet
Computer crime
pubcrawl
Human behavior
Electronic mail
invasive software
malware
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »