Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer viruses
biblio
Flubot Malware Hybrid Analysis on Android Operating System
Submitted by grigby1 on Wed, 09/20/2023 - 10:51am
Phishing
telecommunication traffic
static analysis
source coding
Servers
Resiliency
resilience
pubcrawl
privacy
Android malware
operating systems
Metrics
Malware Analysis
Hybrid Analysis
Human behavior
flubot malware
computer viruses
biblio
Malware Detection Approach Based on the Swarm-Based Behavioural Analysis over API Calling Sequence
Submitted by grigby1 on Mon, 09/18/2023 - 4:35pm
dynamic analysis
word embedding
API calling sequence
Ant Colony
Resiliency Coordinator
Behavioral sciences
ubiquitous computing
computer viruses
Malware Analysis
graph theory
machine learning
malware
Databases
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Organizations
biblio
Detection of Malware in UHF RFID User Memory Bank using Random Forest Classifier on Signal Strength Data in the Frequency Domain
Submitted by grigby1 on Fri, 03/17/2023 - 12:52pm
malware
signal strength
maxima detection
RFIDs
RFID tags
codes
computer viruses
Human Factors
frequency-domain analysis
feature extraction
Random Forest
Data models
Conferences
Resiliency
resilience
pubcrawl
Forestry
biblio
An Experimental Analysis on Malware Detection in Executable Files using Machine Learning
Submitted by grigby1 on Thu, 05/19/2022 - 12:59pm
malware
trojan horse detection
trojan horse
Executable Files
Adware
Virus
computer viruses
spyware
Trojan horses
tools
composability
internet
Resiliency
resilience
pubcrawl
Support vector machines
machine learning algorithms
machine learning
biblio
Analysis of Zero-Day Virus Suppression Strategy based on Moving Target Defense
Submitted by grigby1 on Tue, 02/22/2022 - 5:45pm
zero-day virus
suppression strategy
Computer simulation
computer viruses
moving target defense
Transforms
Switching frequency
Switches
Computational modeling
Scalability
Conferences
Resiliency
resilience
Metrics
pubcrawl
biblio
Detecting Malware, Malicious URLs and Virus Using Machine Learning and Signature Matching
Submitted by grigby1 on Mon, 02/07/2022 - 4:47pm
prediction
Virus
URL Detection
Signature Matching
Regression
signature
Malware Analysis
Random Forest
computer viruses
classification
Frequency conversion
Uniform resource locators
privacy
Trojan horses
malware
Radio frequency
Resiliency
resilience
Metrics
Human behavior
pubcrawl
machine learning
security
biblio
Exploiting Ransomware Paranoia For Execution Prevention
Submitted by aekwall on Tue, 08/31/2021 - 11:41am
API calls
composability
computer viruses
dynamic analysis
encryption
Execution Prevention
Metrics
Monitoring
pubcrawl
Ransomware
Resiliency
biblio
Relating the Empirical Foundations of Attack Generation and Vulnerability Discovery
Submitted by aekwall on Thu, 04/08/2021 - 4:34pm
Payloads
vulnerability discovery
information foraging
automatic exploit generation
automatic attack generation
antivirus tool
Information Reuse and Security
security testing
security auditing
Trojan detection
Compositionality
anti-virus
security
computer viruses
Trojan horses
Data mining
Analytical models
program testing
tools
software security
pubcrawl
Resiliency
Data models
malware detection
biblio
Analysis of Fileless Malware and its Evasive Behavior
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
static and advanced malware analysis
malware threats
Memory Analysis
Metrics
operating systems
Payloads
PowerShell (PS)
pubcrawl
resilience
security
malware
Task Analysis
tools
Trojan horses
white box
White Box Security
Windows Management Instrumentation (WMI)
Windows operating system
Windows Operating System Security
computer viruses
privacy
Predictive Metrics
Human behavior
Resiliency
Advance Volatile Threat
Advance Volatile Threat (AVT)
composability
computer systems
Malware Analysis
different malware
evasion
executable malware
file-based malware
fileless malware
Instruments
internet
invasive software
biblio
New Virus Infection Technology and Its Detection
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
pubcrawl
Windows system
Windows Operating System Security
Windows operating system
Viruses (medical)
software engineering
security technology
security
Resists
Resiliency
resilience
composability
Microsoft Windows (operating systems)
Metrics
Instruments
Information age
file viruses
file virus infection
dynamic binary instrumentation
computer viruses
computer virus infection
computer virus detection
1
2
3
4
5
next ›
last »