Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
invasive software
biblio
SMSBotHunter: A Novel Anomaly Detection Technique to Detect SMS Botnets
Submitted by aekwall on Mon, 10/12/2020 - 11:43am
electronic messaging
Human Behavior and Cybersecurity
SMSBotHunter
SMS stealer botnets
SMS spammer botnets
SMS botnet
one-class classification
mobile botnets
detect SMS botnets
SMS messages
dynamic analysis
anomaly detection technique
Anomaly Detection
botnet
Training
internet
Cryptography
Mobile handsets
pubcrawl
Human behavior
feature extraction
mobile computing
invasive software
malware
Servers
biblio
Countering Cybersecurity and Counterfeit Material Threats in Test Systems
Submitted by aekwall on Mon, 09/28/2020 - 11:35am
mission critical electronics
AS5553
ATE system
ATEasy
commercial-off-the-shelf instrumentation
cybersecurity issue
LXI
military products
missile assemblies
aerospace products
secure software-based system
Security Technical Implementation Guide (STIG)
test development environment
test parameters
test sequences
TPS
undetected data breach
UUT
electronic warfare
data integrity
invasive software
Resiliency
pubcrawl
composability
Cybersecurity
program testing
Automated Secure Software Engineering
Data Security
ATE
automatic test equipment
malware
National security
automatic test software
automatic test systems
AD9100D
biblio
Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
Correlation
confinement
runtime malware detection
real-time malware control strategies
network-level malware confinement
network functionality
Malware propogation
Malware propagation
Malware confinement
lightweight node-level malware detection
average network throughput
predictive control
IoT networks
cyber-physical systems
privacy
computer network security
malware detection
composability
pubcrawl
Resiliency
feature extraction
invasive software
performance evaluation
security
Runtime
malware
Internet of Things
network security
Detectors
biblio
Whispering Botnet Command and Control Instructions
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Compositionality
whispering botnet command and control instructions
whisper
stealthy communication methods
radar communication
peer-to-peer communication infrastructure
dark communication strategy
control bots
C&c
bidirectional botnet command and control operations
command and control systems
botnet
Cryptography
Metrics
botnets
invasive software
Protocols
internet
computer network security
Resiliency
pubcrawl
Peer-to-peer computing
blockchain
biblio
Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Botnet detection
real-world domain names
neural network
HMM
frequency-domain analysis
feedforward neural network
edit distance
domain generation algorithm
domain flux-based DGA botnet detection
domain flux-based botnets
Domain Flux
DGA-based botnets
DGA
C&C server
feature extraction
Hidden Markov models
feedforward neural nets
botnet
ROC curve
Dictionaries
Compositionality
Metrics
botnets
invasive software
Correlation
computer network security
Resiliency
pubcrawl
biblio
Counteraction against Internet of Things Botnets in Private Networks
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Metrics
private networks
private IoT networks
private Internet of Things network
IoT botnets activity
Internet of Things botnets
botnet threats
botnet prevention
botnet behavior
architectural features
botnet
Software systems
Compositionality
computer architecture
botnets
invasive software
Computer crime
data privacy
performance evaluation
IoT devices
computer network security
Resiliency
pubcrawl
IoT
Internet of Things
biblio
Analysis of IoT Botnet Architectures and Recent Defense Proposals
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
distributed denial of service attacks
IoT botnet architectures
defense proposals
computationally limited devices
botnet
architecture
defense
Compositionality
Cybersecurity
Proposals
DDoS
Metrics
computer architecture
botnets
invasive software
malware
Computer crime
malicious actors
IoT devices
computer network security
Resiliency
pubcrawl
IoT
Internet of Things
biblio
An approach for host based botnet detection system
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
Metrics
modern malware
host-based intrusion detection system
botnet detection system
botnet attack detection
Biological cells
botnet
genetic algorithm
genetic algorithms
Compositionality
tools
botnets
invasive software
network security
intrusion detection system
computer network security
Resiliency
pubcrawl
IP networks
Intrusion Detection
biblio
SHIELDNET: An Adaptive Detection Mechanism against Vehicular Botnets in VANETs
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
road safety
vehicular bots
vehicular botnets
vehicular botnet communication
vehicular botnet attacks
VANET Security
SHIELDNET
Reputation-Based Security
Internet botnets
inter-vehicular communications
efficiency 77.0 percent
adaptive detection mechanism
collision avoidance
botnet
Intrusion Detection
learning (artificial intelligence)
Compositionality
Metrics
vehicular ad hoc networks
botnets
invasive software
standards
Protocols
internet
computer network security
Resiliency
pubcrawl
machine learning algorithms
machine learning
biblio
Detecting Centralized Architecture-Based Botnets using Travelling Salesperson Non-Deterministic Polynomial-Hard problem-TSP-NP Technique
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
Botnet detection
botnet
TSP-NP hard problem
travelling salesperson nondeterministic polynomial-hard problem-TSP-NP technique
travelling salesman problems
traveling salesperson person
NP-hard problem
nondeterministic polynomial-time hardness
deterministic
Detecting
centralized botnet architecture
centralized architecture-based botnets
Centralized
botnet developers
botnet detection accuracy
pubcrawl
botmaster
attack techniques
combinatorial optimization
Compositionality
optimisation
Metrics
DDoS Attacks
botnets
invasive software
Computer crime
architecture
internet
computer network security
Resiliency
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »