Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer viruses
biblio
Analysis of the Most Common Software and Hardware Vulnerabilities in Microprocessor Systems
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
resilience
Metrics
microcomputers
microprocessor systems
Microsoft Windows (operating systems)
network access
Production
Program processors
pubcrawl
remote attack
local computer calculation network
Resiliency
Server Message Block service
Silicon
Software Vulnerability
Transistors
WannaCry trojan encoder
Windows Operating System Security
Windows OS
encryption program
security
authorisation
composability
Computer crime
computer viruses
Computers
Cryptography
Data protection
Windows operating system
File systems
Hardware
hardware algorithm protection
hardware vulnerabilities
hardware vulnerability
information protection
information security
invasive software
biblio
A Framework for Collecting and Analysis PE Malware Using Modern Honey Network (MHN)
Submitted by grigby1 on Thu, 03/04/2021 - 2:44pm
PE malware
malware PE file type formats
malware samples
Metrics
modern honey network
operating systems
operating systems (computers)
Payloads
PE file format
malware information
resilience
security
security threat
static analysis techniques
Windows operating system
Windows Operating System Security
windows-based malware
static analysis
malware detection
malware collection technique
Malware Analysis
malware
learning (artificial intelligence)
invasive software
file format information
feature extraction
dynamic analysis techniques
Computers
computer viruses
Resiliency
composability
Human behavior
pubcrawl
biblio
HAC-T and Fast Search for Similarity in Security
Submitted by aekwall on Mon, 02/22/2021 - 1:43pm
nearest neighbor search
Trend Locality Sensitive Hashing (TLSH)
tree-based index
tools
threshold based hierarchical agglomerative clustering algorithm
standards
similarity digests
security operations center operators
security of data
security analysts
security
search problems
pubcrawl
Predictive Metrics
nearest neighbour methods
Approximate Nearest Neighbour
Measurement
malware
Indexes
Hierarchical Agglomerative Clustering (HAC)
HAC-T
Fuzzy Hashing
fast nearest neighbor search techniques
Cryptography
computer viruses
clustering technique
Clustering algorithms
clustering
cluster quality
cluster malware
biblio
PREEMPT: PReempting Malware by Examining Embedded Processor Traces
Submitted by grigby1 on Fri, 10/30/2020 - 12:19pm
learning (artificial intelligence)
zero overhead
tools
software-based AVS
security
Scalability
real-time systems
pubcrawl
program debugging
processor traces
PREEMPT malware
post-silicon validation
malware detection
malware
machine learning-based classifiers
low-latency technique
anti-virus software tools
invasive software
i-o systems security
I-O Systems
HPC
hardware-level observations
Hardware performance counters
Hardware
ETB
embedded trace buffer
embedded systems
embedded processor traces
debug hardware component
Databases
computer viruses
biblio
Behavioral malware analysis algorithm comparison
Submitted by aekwall on Mon, 10/26/2020 - 12:12pm
tools
behavioral malware analysis
Sensitivity
Predictive Metrics
behavioral analysis
computer viruses
Malware Analysis
privacy
testing
computer security
Prediction algorithms
malware
Metrics
Algorithms
pubcrawl
Human behavior
Resiliency
machine learning
learning (artificial intelligence)
machine learning algorithms
malware detection
biblio
Automatic XSS Detection and Automatic Anti-Anti-Virus Payload Generation
Submitted by aekwall on Mon, 09/28/2020 - 12:35pm
parameter characteristics
SVM algorithm
XSS vulnerability
automatic anti-anti-virus payload generation tool
automatic bypassing
automatic detection
automatic XSS detection tool
DQN algorithm
malicious XSS attacks
malicious XSS parameters
Web application
RNN LSTM algorithm
rule-based WAF
user input parameters
user interaction
Web 2.0 era
XSS attack
XSS attack codes
Cross Site Scripting
internet
Support vector machines
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Human behavior
pubcrawl
Reinforcement learning
Scalability
tools
cross-site scripting
Training
recurrent neural nets
automatic generation
computer viruses
Payloads
Browsers
biblio
Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
Attack Strategies
confinement
vulnerable production network
suspicious microservices
security incidents
sandnet
sandbox network
quarantined services
QoD
Production systems
open production network
network deception mechanisms
live confinement
evaluation scenario
container-based microservice architectures
Cloning
computer network security
Degradation
Switches
computer viruses
Containers
cyber-physical systems
sandboxing
Measurement
threat intelligence
privacy
Production
composability
pubcrawl
Resiliency
system monitoring
security
biblio
Cyber Security at a Glance
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Sniffing
data records
DDoS and DOS attacks
DDoS Attack
distributed denial-of-service attack
firewall
hacking techniques
man in the middle attack
polymorphic virus
proxy
computer malwares
social engineering
spoofing
Tor browser
trojan
Trojan horses
Trojans
vpn
Worm
BIOS Security
Human Factors
Computer crime
Firewalls (computing)
internet
pubcrawl
Metrics
Resiliency
resilience
cyber security
malware
Scalability
Cyber Attacks
Computer hacking
denial-of-service attack
computer viruses
antivirus
BeEF
boot sector virus
Brute forcing
biblio
Composing system integrity using I/O automata
Submitted by grigby1 on Fri, 09/04/2020 - 3:15pm
closure properties
BIOS Security
vending machine
valid states
transition control
taxonomy
system integrity
invalid starts
invalid initial states
integrity definitions
input output automata
I/O automata
externally-controlled transitions
customer environment
computer viruses
security
Automatic control
automata theory
automata
system design
Safety
Human Factors
resilience
Resiliency
Metrics
pubcrawl
data integrity
Scalability
control systems
security of data
biblio
DDOS Defense Strategy in Software Definition Networks
Submitted by aekwall on Mon, 06/29/2020 - 1:05pm
DDoS
victim defense strategy
ubiquitous situation
software definition network
Software Definition
social life
network society
network economy
military life
distributed defense strategy
distributed defense strategies
defense strategy
DDOS defense strategy
DDoS Attack
cultural life
DDoS Attack Prevention
Computer crime
denial-of-service attack
intermediate network
computer viruses
attack
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
network security
software defined networking
IP networks
computer network security
« first
‹ previous
1
2
3
4
5
next ›
last »