Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
defense
biblio
Deceiving the Deceivers: Deception Technology Emerges as an IT Security Defense Strategy
Submitted by
willirn1
on Tue, 09/24/2019 - 2:08pm
Cognitive Security
Cognitive Security in Cyber
deception
defense
biblio
POSTER: Zero-Day Evasion Attack Analysis on Race Between Attack and Defense
Submitted by
grigby1
on Mon, 12/10/2018 - 10:39am
resilience
pubcrawl
Metrics
Resiliency
composability
adversarial example
Adversarial training
deep neural network (dnn)
zero-day adversarial examples
Zero day attacks
defense
biblio
Evaluation of Apache Spot's Machine Learning Capabilities in an SDN/NFV Enabled Environment
Submitted by
grigby1
on Mon, 12/10/2018 - 10:39am
Apache Spot
composability
defense
decomposition
latent Dirichlet allocation
machine learning
Metrics
network function virtualisation
Penetration Testing
pubcrawl
resilience
Resiliency
SHIELD Project
software defined networking
virtual machine security
Zero day attacks
biblio
Spatio-temporal Context Reduction: A Pointer-analysis-based Static Approach for Detecting Use-after-free Vulnerabilities
Submitted by
grigby1
on Mon, 12/10/2018 - 10:39am
resilience
pubcrawl
Metrics
Resiliency
composability
bug detection
program analysis
use-after-free
Zero day attacks
defense
biblio
Multi-source Data Analysis and Evaluation of Machine Learning Techniques for SQL Injection Detection
Submitted by
grigby1
on Mon, 12/10/2018 - 10:39am
resilience
pubcrawl
Metrics
Resiliency
composability
machine learning
network intrusion detection
SQL injection
Zero day attacks
defense
biblio
Cracking IoT Device User Account via Brute-force Attack to SMS Authentication Code
Submitted by
grigby1
on Mon, 12/10/2018 - 10:39am
Router Systems Security
Brute-force Attack
composability
defense
IoT device
Metrics
pubcrawl
resilience
Resiliency
SMS authentication code
user account
Zero day attacks
biblio
Integrated Instruction Set Randomization and Control Reconfiguration for Securing Cyber-physical Systems
Submitted by
grigby1
on Mon, 12/10/2018 - 10:38am
composability
cyber-physical systems
defense
Instruction Set Randomization
Metrics
moving target defenses
Predictive Metrics
pubcrawl
resilience
Resiliency
Resilient Architectures
Scalability
Zero day attacks
biblio
A Machine Learning Approach to Malicious JavaScript Detection using Fixed Length Vector Representation
Submitted by
grigby1
on Mon, 12/10/2018 - 10:38am
authoring languages
Browsers
classifier model
composability
Context modeling
cyberattacks
Cybersecurity
D3M Dataset
defense
Doc2Vec
Doc2Vec features
drive-by-download attacks
Drive-by-Download Data
feature extraction
feature learning
features extraction
fixed length vector representation
invasive software
Java
JavaScript
learning (artificial intelligence)
machine learning
malicious JavaScript detection
malicious JS code detection
malicious JS codes
Metrics
neural nets
neural network model
Neural networks
pattern classification
plugin software
Predictive models
pubcrawl
resilience
Resiliency
Support vector machines
Vectors
web applications
Web site
Web sites
Zero day attacks
Zero-day attacks
biblio
An Adaptive Real-Time Architecture for Zero-Day Threat Detection
Submitted by
grigby1
on Mon, 12/10/2018 - 10:38am
Adaptation models
adaptive detection schemes
adaptive real-time architecture
adaptive threat detection architecture
Anomaly Detection
attacker behavior
composability
defense
detection models training
Distributed databases
honeypots
learning (artificial intelligence)
legitimate user behavior
Metrics
network operator
online trained supervised classification schemes
online trained unsupervised anomaly detection schemes
pubcrawl
real-time systems
resilience
Resiliency
security
security of data
security systems
stream processing technology
Support vector machines
Training
Zero day attacks
Zero-day attacks
zero-day threat detection
zero-day threats learning
biblio
A Zero-Day Resistant Malware Detection Method for Securing Cloud Using SVM and Sandboxing Techniques
Submitted by
grigby1
on Mon, 12/10/2018 - 10:38am
Cloud Computing
clouds
composability
computer security
Conferences
defense
feature extraction
IT infrastructure
machine learning
malware
Metrics
n-class SVM
networking schemes
operating systems (computers)
OS images
phase exhaustive technique
pubcrawl
resilience
Resiliency
sandboxing techniques
security of data
Support vector machines
SVM
tools
user machine
Zero day attacks
Zero-day attacks
Zero-day resistance
zero-day resistant malware detection method
1
2
3
4
next ›
last »