Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
computer viruses
biblio
Detection of Malware in UHF RFID User Memory Bank using Random Forest Classifier on Signal Strength Data in the Frequency Domain
Submitted by grigby1 on Fri, 03/17/2023 - 12:52pm
malware
signal strength
maxima detection
RFIDs
RFID tags
codes
computer viruses
Human Factors
frequency-domain analysis
feature extraction
Random Forest
Data models
Conferences
Resiliency
resilience
pubcrawl
Forestry
biblio
An Experimental Analysis on Malware Detection in Executable Files using Machine Learning
Submitted by grigby1 on Thu, 05/19/2022 - 12:59pm
malware
trojan horse detection
trojan horse
Executable Files
Adware
Virus
computer viruses
spyware
Trojan horses
tools
composability
internet
Resiliency
resilience
pubcrawl
Support vector machines
machine learning algorithms
machine learning
biblio
Analysis of Zero-Day Virus Suppression Strategy based on Moving Target Defense
Submitted by grigby1 on Tue, 02/22/2022 - 5:45pm
zero-day virus
suppression strategy
Computer simulation
computer viruses
moving target defense
Transforms
Switching frequency
Switches
Computational modeling
Scalability
Conferences
Resiliency
resilience
Metrics
pubcrawl
biblio
Detecting Malware, Malicious URLs and Virus Using Machine Learning and Signature Matching
Submitted by grigby1 on Mon, 02/07/2022 - 4:47pm
prediction
Virus
URL Detection
Signature Matching
Regression
signature
Malware Analysis
Random Forest
computer viruses
classification
Frequency conversion
Uniform resource locators
privacy
Trojan horses
malware
Radio frequency
Resiliency
resilience
Metrics
Human behavior
pubcrawl
machine learning
security
biblio
Exploiting Ransomware Paranoia For Execution Prevention
Submitted by aekwall on Tue, 08/31/2021 - 11:41am
API calls
composability
computer viruses
dynamic analysis
encryption
Execution Prevention
Metrics
Monitoring
pubcrawl
Ransomware
Resiliency
biblio
Relating the Empirical Foundations of Attack Generation and Vulnerability Discovery
Submitted by aekwall on Thu, 04/08/2021 - 4:34pm
Payloads
vulnerability discovery
information foraging
automatic exploit generation
automatic attack generation
antivirus tool
Information Reuse and Security
security testing
security auditing
Trojan detection
Compositionality
anti-virus
security
computer viruses
Trojan horses
Data mining
Analytical models
program testing
tools
software security
pubcrawl
Resiliency
Data models
malware detection
biblio
Analysis of Fileless Malware and its Evasive Behavior
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
static and advanced malware analysis
malware threats
Memory Analysis
Metrics
operating systems
Payloads
PowerShell (PS)
pubcrawl
resilience
security
malware
Task Analysis
tools
Trojan horses
white box
White Box Security
Windows Management Instrumentation (WMI)
Windows operating system
Windows Operating System Security
computer viruses
privacy
Predictive Metrics
Human behavior
Resiliency
Advance Volatile Threat
Advance Volatile Threat (AVT)
composability
computer systems
Malware Analysis
different malware
evasion
executable malware
file-based malware
fileless malware
Instruments
internet
invasive software
biblio
New Virus Infection Technology and Its Detection
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
pubcrawl
Windows system
Windows Operating System Security
Windows operating system
Viruses (medical)
software engineering
security technology
security
Resists
Resiliency
resilience
composability
Microsoft Windows (operating systems)
Metrics
Instruments
Information age
file viruses
file virus infection
dynamic binary instrumentation
computer viruses
computer virus infection
computer virus detection
biblio
Analysis of the Most Common Software and Hardware Vulnerabilities in Microprocessor Systems
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
resilience
Metrics
microcomputers
microprocessor systems
Microsoft Windows (operating systems)
network access
Production
Program processors
pubcrawl
remote attack
local computer calculation network
Resiliency
Server Message Block service
Silicon
Software Vulnerability
Transistors
WannaCry trojan encoder
Windows Operating System Security
Windows OS
encryption program
security
authorisation
composability
Computer crime
computer viruses
Computers
Cryptography
Data protection
Windows operating system
File systems
Hardware
hardware algorithm protection
hardware vulnerabilities
hardware vulnerability
information protection
information security
invasive software
biblio
A Framework for Collecting and Analysis PE Malware Using Modern Honey Network (MHN)
Submitted by grigby1 on Thu, 03/04/2021 - 2:44pm
PE malware
malware PE file type formats
malware samples
Metrics
modern honey network
operating systems
operating systems (computers)
Payloads
PE file format
malware information
resilience
security
security threat
static analysis techniques
Windows operating system
Windows Operating System Security
windows-based malware
static analysis
malware detection
malware collection technique
Malware Analysis
malware
learning (artificial intelligence)
invasive software
file format information
feature extraction
dynamic analysis techniques
Computers
computer viruses
Resiliency
composability
Human behavior
pubcrawl
1
2
3
4
5
next ›
last »