Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
signature based detection
biblio
A study to Understand Malware Behavior through Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:11am
malware
malware detection
invasive software
feature extraction
Resiliency
Human behavior
pubcrawl
Metrics
tools
privacy
static analysis
Malware Analysis
Zero-day attacks
malware behavior
computer science
Predictive Metrics
Histograms
behavioral based malware signature
malware features
Malware Packer
Malware Signature
mutated malware
obfuscated malware
signature based detection
biblio
Implementation of Blockchain Based Distributed Web Attack Detection Application
Submitted by grigby1 on Fri, 09/18/2020 - 1:07pm
Cryptography
blockchain
Distributed databases
pubcrawl
resilience
Resiliency
internet
composability
smart contracts
Metrics
Reliability
blockchain based web attack detection model
firewalls
signature based detection
signature based detection method
Stakeholders
web application firewalls
Web attack detection
web attack detection application
Web platforms
Web servers
web-based attacks
Co
command injection attacks
biblio
Detection of transformed malwares using permission flow graphs
Submitted by grigby1 on Wed, 06/20/2018 - 11:49am
Android app
Android malware
Androids
attack surface
code level changes
control flow
detection accuracy
feature extraction
flow graphs
graph based similarity metrics
graph theory
Human behavior
Humanoid robots
invasive software
learning (artificial intelligence)
lightweight static Permission Flow Graph based approach
malicious apps
malware
Malware Analysis
malware variants
Measurement
Metrics
mobile computing
nontransformed malware
permission flow graph
permission flow graphs
permission framework
privacy
pubcrawl
resilience
Resiliency
signature based detection
smart phones
state-of-the-art graph similarity algorithm
transformed malware
vertex level