Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Attack Surfaces
biblio
A Survey on Amazon Alexa Attack Surfaces
Submitted by aekwall on Thu, 05/13/2021 - 10:35am
Scalability
voice hacking
Virtual assistants
echo
Amazon Alexa
Alexa skills
attack surface
Attack Surfaces
Surface treatment
Speech recognition
security
usability
Data collection
Ecosystems
privacy
Metrics
pubcrawl
Resiliency
Internet of Things
biblio
Fuzzy-Import Hashing: A Malware Analysis Approach
Submitted by aekwall on Mon, 01/18/2021 - 10:25am
Import Hashing
Task Analysis
Scalability
Resiliency
Ransomware
pubcrawl
Metrics
Malware Analysis
invasive software
Attack Surfaces
fuzzy-import hashing
fuzzy set theory
Fuzzy Hashing
Fuzzy Cryptography
fuzzy c-means clustering
Electronic mail
Cryptography
counterfeit malware samples
biblio
CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems
Submitted by grigby1 on Wed, 11/04/2020 - 12:35pm
reference CSB system
fault tolerant computing
malicious activities
malicious insider threats
Measurement
Metrics
metrics testing
multicloud strategy
open systems
proactive security risk analysis
pubcrawl
fault tolerance
risk analysis
risk management
Secure Configuration
security
security complexities
Security Metrics
security of data
security risk assessment
storage management
cloud security system
Attack Surfaces
auditing
BrokerMonkey
bucket policy misconfigurations
Cascading style sheets
chaos engineering failure injection strategies
Cloud Audit
cloud auditing schemes
Cloud Computing
API interoperability issues
cloud storage broker systems
cloud storage services
Cloud-Security
CloudRAID
Common Configuration Scoring System
Computational modeling
continuous snapshotting mechanism
CSB resource audits
CSBAuditor
biblio
Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors Using Fuzzy Hashing and Fuzzy C-Means Clustering
Submitted by grigby1 on Wed, 02/26/2020 - 3:41pm
signature based defense
fuzzy techniques
Indexes
Locky
malicious code writing
Measurement
pattern clustering
privacy
pubcrawl
Ransomware
ransomware threat actor
SDHASH
fuzzy similarity scores
Similarity Preserving
SSDEEP
successful attack vectors
threat actors
threat vectors
Triaging
unknown ransomware
unlimited polymorphic samples
WannaCry
WannaCryptor
Writing
Cryptography
Resiliency
Metrics
Fuzzy Cryptography
Attack Surfaces
c-means clustering
Cerber
cluster ransomware samples
clustering methods
clustering techniques
composability
Context-Triggered Piecewise Hashing
Scalability
CryptoWall
CTPH
cyberthreat hunting
efficient fuzzy analysis approach
FCM
FCM clustering results
fuzzy c-means clustering
Fuzzy Hashing
fuzzy hashing methods
fuzzy set theory
file
Measuring Security
Submitted by David Wagner on Tue, 08/21/2012 - 12:31pm. Contributor:
David Wagner
Attack Surfaces
Measuring Security
SoS MURI
Academia
Kickoff Meeting - Oct'11