Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Malware propagation
biblio
Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks
Submitted by aekwall on Mon, 09/21/2020 - 2:46pm
Correlation
confinement
runtime malware detection
real-time malware control strategies
network-level malware confinement
network functionality
Malware propogation
Malware propagation
Malware confinement
lightweight node-level malware detection
average network throughput
predictive control
IoT networks
cyber-physical systems
privacy
computer network security
malware detection
composability
pubcrawl
Resiliency
feature extraction
invasive software
performance evaluation
security
Runtime
malware
Internet of Things
network security
Detectors
biblio
Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks
Submitted by BrandonB on Fri, 05/01/2015 - 6:59am
malware propagation model
WSN
wireless sensor networks
traditional epidemic theory
telecommunication security
telecommunication control
sleep mode
Silicon
sensor node characteristics
saddle-point
overall cost minimization
optimal dynamic strategy
optimal control problem
malware-defense differential game
malware propagation prevention
bang-bang control
Malware propagation
malware
invasive software
Grippers
Games
epidemic theory
Differential Games
differential game-based strategy
Differential game
differential equations
decision-making problem
control systems
bang-bang controls
biblio
SharkFin: Spatio-temporal mining of software adoption and penetration
Submitted by tdumitra on Fri, 01/09/2015 - 8:35pm
data analysis
Empirical Models for Vulnerability Exploits
Internet security
Jan'15
Malware propagation
Metrics
UMD
Metrics
UMD
Empirical Models for Vulnerability Exploits
UMD PROJECTS:
Jan'15
Empirical Models for Vulnerability Exploits