Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
malicious code
biblio
Real Time early Multi Stage Attack Detection
Submitted by aekwall on Mon, 01/10/2022 - 11:54am
malware detection
Attack vectors
Windows API
Tactics Techniques Procedure (TTP)
Portable Executable (PE)
multistage attack
MITRE
malicious code
Browsers
API calls
static analysis
security
malware
Manuals
Human behavior
Resiliency
Scalability
pubcrawl
machine learning
feature extraction
real-time systems
biblio
Research on Malware Variant Detection Method Based on Deep Neural Network
Submitted by grigby1 on Mon, 01/10/2022 - 11:31am
Metrics
Virtualization
Software algorithms
sandbox
Resiliency
resilience
pubcrawl
policy-based governance
operating systems
Neural networks
Neural Network Security
virtualization privacy
malware
malicious code
Industrial Information Security
cyber physical systems
convolutional neural network
convolution
control systems
collaboration
Artificial Neural Networks
artificial neural network
biblio
C500-CFG: A Novel Algorithm to Extract Control Flow-based Features for IoT Malware Detection
Submitted by grigby1 on Fri, 12/11/2020 - 1:34pm
Internet of Things
text-based methods
text analysis
static characteristic extraction method
Resiliency
resilience
pubcrawl
privacy
Metrics
malware detection
Malware Analysis
malicious code
IoT malware detection
IoT
invasive software
C500-CFG
Human behavior
high-complexity programs
graph theory
feature information
feature extraction
dynamic programming
Ding's NP-hard problem
decom-piled executable codes
control flow-based features
control flow graph
computer network security
computational complexity
C500-CFG algorithm
biblio
Evolutionary Computation for Improving Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:13am
program debugging
variable-strength covering arrays
software improvement
malicious code
individual software artifacts
GI-based bug repair
GI-based approach
genetic improvement
automated repair
automated malware analysis
benign software
Genetics
evolutionary computation
malicious software
Predictive Metrics
Servers
malware samples
Malware Analysis
genetic algorithms
software maintenance
privacy
tools
Metrics
pubcrawl
Human behavior
Resiliency
invasive software
security
malware
biblio
United We Stand: A Threshold Signature Scheme for Identifying Outliers in PLCs
Submitted by grigby1 on Fri, 09/04/2020 - 2:16pm
Pulse width modulation
malware
Metrics
OpenPLC software
particular state
Pins
PLCs
predefined states
programmable controllers
Protocols
Prototypes
pubcrawl
malicious disruption
pulse width modulation pins
PWM
Raspberry Pi
Registers
resilience
Resiliency
Scalability
security
signature shares
uncorrupted PLC
group-signature
\$-threshold signature scheme
Anomaly Detection
BIOS Security
compromised state
control engineering computing
corrupted PLC
cyber security awareness week-2017 competition
digital signatures
electro-mechanical processes
finite state machine
finite state machines
(k
Human Factors
I-O Systems
i-o systems security
I/O pin configuration attack
input-output mechanism
IO pin configuration attack
l)-threshold signature scheme
Legacy PLC system
legacy PLCs
malicious code
biblio
Identifying Security Spots for Data Integrity
Submitted by grigby1 on Fri, 04/24/2020 - 3:21pm
malware
tools
security spots identification
Security spot
security of data
Resiliency
resilience
pubcrawl
program diagnostics
object-oriented programs
object-oriented programming
object oriented security
Metrics
benign code
malicious code
integrity breach conditions
Integrity breach condition
insiders
insider attack
IBCs
Databases
data integrity
Couplings
coupling
composability
biblio
K-Means Clustering Analysis Based on Adaptive Weights for Malicious Code Detection
Submitted by grigby1 on Mon, 04/06/2020 - 1:23pm
network coding
traffic characteristics
traditional detection techniques
telecommunication traffic
statistical analysis
Resiliency
resilience
pubcrawl
pattern clustering
network traffic
network security
network scanning
adaptive weights-MMKM
network behavior
Metrics
malicious codes
malicious code detection
malicious code
k-means clustering analysis
cyber physical systems
computer network security
composability
clustering
AW-MMKM
biblio
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs
Submitted by grigby1 on Thu, 01/31/2019 - 11:13am
Resiliency
malware
Metrics
Network
networking equipment
optical
Optical sensors
optical signals
Protocols
pubcrawl
remote cameras
resilience
malicious code
router LED
security cameras
sensitive information
smart phones
smartphone cameras
status LED
switch LED
telecommunication security
transmission protocol
xLED
Ezfiltration
air-gap
air-gapped network
bit rate 1.0 bit/s
bit rate 2000.0 bit/s
Cameras
composability
Computer crime
covert channel (key words)
covert data exfiltration
covert-channel
Air gaps
hermetic isolation
Human behavior
internet
invasive software
IT network
LAN routers
LAN switches
light emitting diodes
Local area networks
low-level control
biblio
XSS detection with automatic view isolation on online social network
Submitted by grigby1 on Thu, 04/20/2017 - 11:37am
social networking (online)
OSN
OSN-based Web application
pubcrawl
Radio frequency
Request Authentication
Resiliency
security of data
Session
online social network
string value extraction
Uniform resource locators
Web page
XSS attack vector repository
XSS attack vectors
XSS cheat sheet
XSS detection
authentication
malicious code
Isolators
internet
Humhub
Human behavior
false positive rate
false negatives rate
Decision support systems
Cross-site scripting (XSS)
cross-site scripting
Cross Site Scripting
Consumer electronics
Conferences
composability
automatic view isolation
biblio
"A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:18pm
malware
zero-day exploit
wavelet transforms
wavelet transform
wavelet package analysis
wavelet analysis
static detection method
pubcrawl170101
Portable document format
persistent threat attacks
Compounds
malicious program
malicious document detection system
malicious document detection
malicious code
invasive software
infected compound document
feature extraction
entropy analysis componen
document handling
1
2
next ›
last »