Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer viruses
biblio
Ransomware: The CryptoVirus Subverting Cloud Security
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
security
malware
Metrics
pubcrawl
Ransomware
ransomware attack
ransomware vulnerabilities
Resiliency
Scalability
IT security specialists
security effectiveness
security threat
Servers
threats
ubiquitous computing
Ubiquitous Computing Security
ubiquitous environment
vulnerabilities
cloud threat mechanisms
business enterprises
cloud
Cloud architecture
Cloud Computing
cloud network
cloud platforms
Cloud Security
cloud technology
Business
computer architecture
computer viruses
Cryptography
CryptoVirus
disparate locations
Human behavior
Human Factors
information technology
biblio
Malicious URL prediction based on community detection
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
malicious URL prediction
Uniform resource locators
traditional anti-virus technology
static analysis
pubcrawl170108
pubcrawl170107
program diagnostics
network bandwidth
Monitoring
Mobile communication
malware
anti-virus
Malicious URL
graph-based method
graph theory
dynamic monitoring
Data mining
computer viruses
community detection
association rules
association rule
biblio
Designing virus-resistant networks: A game-formation approach
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
optimal network topology
worst-case Nash equilibrium
Viruses (medical)
virus-resistant network design
virus security
virus resiliency
telecommunication network topology
Stability analysis
security
pubcrawl170108
pubcrawl170107
price of anarchy
Peer-to-peer computing
autonomous system
network topology
Nash Equilibrium
Nash equilibria
internet
global optimum
Games
game-formation approach
game theory
decentralized fashion
computer viruses
computer network security
biblio
Dissecting Android Malware: Characterization and Evolution
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
malware
smartphone security
smart phones
representative mobile security software
representative family
Payloads
operating systems (computers)
next-generation antimobile-malware solutions
mobile malware
mobile computing
Mobile communication
mobile antivirus software
activation mechanisms
installation methods
Humanoid robots
evolution-based study
defense capability
computer viruses
carried malicious payloads
Androids
Android platform
Android malware family
Android malware
« first
‹ previous
1
2
3
4
5