Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack pattern
biblio
An Asset-Based Assistance for Secure by Design
Submitted by grigby1 on Thu, 06/24/2021 - 11:26am
Architecture and Design
attack pattern
Automated Secure Software Engineering
composability
computer architecture
Proposals
pubcrawl
resilience
Resiliency
secure-by-design
security
Security Assistance
software engineering
Software systems
system analysis and design
Systems architecture
biblio
Using Attack Pattern for Cyber Attack Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 12:23pm
cyber attribution problem
pubcrawl
Metrics
information system
individual organization
Human behavior
data integrity
data confidentiality
data availability
attack pattern
Cyber Attribution
cyber attack initiator identification
cyber attack
computer network security
composability
attribution
attack scenario
biblio
Security Testing Based on Attack Patterns
Submitted by BrandonB on Tue, 05/05/2015 - 10:48am
security
Unified modeling language
UML state machine
UML state charts
testing
SQL injection
software prototyping
Software
security testing
security of data
Adaptation models
program testing
model-based testing
internet
HTML
Databases
cross-site scripting
attack patterns
attack pattern
agile software development processes
biblio
On a Mathematical Model for Low-Rate Shrew DDoS
Submitted by BrandonB on Thu, 04/30/2015 - 1:17pm
low-rate shrew DDoS
transport protocols
transport control protocol
Throughput
TCP flows
TCP congestion window
shrew distributed denial-of-service
shrew attack
Packet loss
network environments
Mathematical model
Adaptation models
low-rate distributed denial of service (DDoS) attack
internet
delays
computer network security
Computer crime
bottleneck bandwidth
Bandwidth
attack pattern
attack effect estimation
Attack effect