Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer viruses
biblio
Air-Gap Data Transmission Using Screen Brightness Modulation
Submitted by grigby1 on Thu, 01/31/2019 - 12:12pm
Demodulation
unidirectional transmission
screen brightness modulation
Resiliency
resilience
pubcrawl
Monitoring
modulation
Metrics
Image Processing
Human behavior
frequency shift keying
error statistics
Digital demodulation
Air gaps
data communication channel
data communication
computer viruses
computer virus
composability
Cameras
Brightness
BFSK digital modulation
BFSK
Band-pass filters
Air-gap transmission
air-gap data transmission
biblio
A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
network-based intrusion systems
execution sequences
fileless malware
host based intrusion detection system
installed applications
lightweight host-based intrusion detection system
malicious activities
malicious e-mail attachments
management tools
network administrators
enterprise networks
OS vendors
PowerShell process
process generation patterns
process information
serious social problem
Spreadsheet programs
system constructs process trees
targeting organizations
XML
microsoft windows
tools
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
drive-by-download attacks
Intrusion Detection
security of data
Organizations
advanced persistent threat
advanced persistent threats
active processes
anomaly processes
anti-virus software
computer viruses
Electronic mail
biblio
Node energy based virus propagation model for bluetooth
Submitted by grigby1 on Thu, 08/23/2018 - 11:35am
mobile computing
Viruses (medical)
Virus Propagation
smart-phone Era
smart phones
security measures
Resiliency
resilience
pubcrawl
optimal control
Node energy based virus propagation model
Node Energy Based Virus Propagation
node capacity
network traffic
NBV model works
composability
Mobile communication
mobile based Wireless technologies
human factor
Human behavior
Grippers
Electronic mail
E-mail worm Propagation model
computer viruses
computer network security
Computational modeling
Bluetooth
Bluetooth network
bluetooth security
biblio
A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software
Submitted by grigby1 on Wed, 06/20/2018 - 12:57pm
Malware Analysis
static analysis
Resiliency
resilience
pubcrawl
program diagnostics
privacy
Phased arrays
pattern classification
Metrics
Malware Clustering
malware classification
antivirus software detection
malware
lightweight malware classification
internet
Human behavior
Electronic mail
dynamic analysis
Databases
Data mining
cyber threats
computer viruses
arrays
biblio
Hierarchical learning for automated malware classification
Submitted by grigby1 on Wed, 06/20/2018 - 12:56pm
pubcrawl
machine learning solutions
malicious file detection
malicious files automated classification
malware
malware classification
malware label
Metrics
nonhierarchical classifier
pattern classification
privacy
machine learning algorithms
resilience
Resiliency
security domain
signature augmentation
Support vector machines
system monitoring
Training
Win32
Win64
Formal Specification
automated malware classification
binary error rate
classification models
commercial anti-virus products
Companies
computer security
computer viruses
corporate computers
family variant
feature extraction
anti-virus companies
hierarchical labels
hierarchical learning algorithms
Hierarchical Machine Learning
hierarchical structure
home computers
Human behavior
industrial-scale malware dataset
label hierarchy achieves
learning (artificial intelligence)
biblio
Malware classification using static analysis based features
Submitted by grigby1 on Wed, 06/20/2018 - 12:56pm
malware classification
Vegetation
Training
static analysis
Resiliency
resilience
pubcrawl
program diagnostics
privacy
pattern classification
ordinary opcode n-gram based features
Metrics
anti-virus vendors
malware binaries
malware
machine learning features
machine learning algorithms
learning (artificial intelligence)
Human behavior
feature extraction
Decision trees
control statement shingling
computer viruses
biblio
Heterogeneous Malware Spread Process in Star Network
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
Malware Analysis
Steady-state
steady state infection
star network
SIS model
simulation
Silicon
Resiliency
resilience
pubcrawl
privacy
network theory (graphs)
Metrics
meta-stable state fraction
malware spread process
Analytical models
infected nodes
Human behavior
heterogeneous virus spread
heterogeneous SIS model
heterogeneous malware spread process
graph theory
finite size graph
extended N-intertwined model
epidemic threshold
Curing
computer viruses
Computational modeling
Artificial Neural Networks
biblio
Dynamic Ransomware Protection Using Deterministic Random Bit Generator
Submitted by grigby1 on Thu, 05/24/2018 - 12:16pm
protection
Scalability
Resiliency
resilience
Ransomware
random number generator
random number generation service
random number generation
random key generation
public key cryptography
Public key
pubcrawl
Communication networks
Metrics
malware
Human behavior
Generators
encryption key
encryption
dynamic ransomware protection method
deterministic random bit generator
CryptoVirus
crypto-API
computer viruses
biblio
Optimizing Detection of Malware Attacks through Graph-Based Approach
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Metrics
hook attacks
Host-based
invasive software
Kernel
malicious code execution
malicious system call
malware
malware attacks
Graph-model
Monitoring
optimisation
optimization
pubcrawl
resilience
Resiliency
signature-based model
tools
computer viruses
API hook
application program interfaces
application programming interface
attack graphs
code obfuscation technique
communication technology
composability
Computational modeling
API graph-based model
Computers
digital signatures
graph comparison
graph partition
graph theory
graph-based approach
graph-generation
biblio
Detection and Prevention of Crypto-Ransomware
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
Elliptic curve cryptography
Servers
Resiliency
resilience
Ransomware
pubcrawl
Private-key cryptosystem ransomware
Payloads
Metrics
malware
file types
encryption
bitcoin
Electronic mail
Domain Generated Algorithm (DGA)
cybercriminals
Cryptography
Cryptographic Ransomware (CGR)
crypto-ransomware prevention
crypto-ransomware detection
Crypto-Ransomware
computer viruses
Computer crime
composability
« first
‹ previous
1
2
3
4
5
next ›
last »